CVE-2025-39763
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2025-39763 is a vulnerability discovered in the Linux kernel's ACPI APEI (Advanced Configuration and Power Interface Advanced Platform Error Interface) component, disclosed on September 11, 2025. The vulnerability affects the error handling mechanism in the Linux kernel, specifically related to how synchronous memory errors are processed (NVD).

Technical details

The vulnerability occurs when a user-space process triggers a 2-bit uncorrected error, causing the CPU to take a synchronous error exception (such as Synchronous External Abort on Arm64). While the kernel normally queues a memoryfailure() work to handle such errors by poisoning and unmapping the affected page, the vulnerability manifests when abnormal synchronous errors occur (like invalid PA, unexpected severity, no memory failure config support, or invalid GUID section). In these cases, no memoryfailure() work is queued, leading to potential system instability. The vulnerability has been assigned a CVSS v3.1 score of 5.5 (Moderate) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (Red Hat).

Impact

When exploited, this vulnerability can cause the user-space process to repeatedly trigger Synchronous External Abort (SEA) exceptions. This continuous loop can exceed the platform firmware threshold or trigger a kernel hard lockup, ultimately resulting in a system reboot. The impact primarily affects system availability, with no direct impact on confidentiality or integrity (NVD).

Mitigation and workarounds

The fix involves implementing a force kill mechanism if no memory_failure() work is queued for synchronous errors. Red Hat has marked this vulnerability as 'Fix deferred' for multiple versions including Red Hat Enterprise Linux 7, 8, 9, and their RT (Real-Time) kernel variants (Red Hat).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40343MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-rt-modules-internal
NoYesDec 09, 2025
CVE-2025-40342MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-debug-modules-extra
NoYesDec 09, 2025
CVE-2025-40341MEDIUM5.1
  • Linux KernelLinux Kernel
  • linux-nvidia-tegra
NoYesDec 09, 2025
CVE-2025-40345N/AN/A
  • Linux KernelLinux Kernel
  • kernel-headers
NoYesDec 12, 2025
CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • linux-azure-6.14
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management