{"id":"CVE-2025-39715","summary":"parisc: Revise gateway LWS calls to probe user read access","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nparisc: Revise gateway LWS calls to probe user read access\n\nWe use load and stbys,e instructions to trigger memory reference\ninterruptions without writing to memory. Because of the way read\naccess support is implemented, read access interruptions are only\ntriggered at privilege levels 2 and 3. The kernel and gateway\npage execute at privilege level 0, so this code never triggers\na read access interruption. Thus, it is currently possible for\nuser code to execute a LWS compare and swap operation at an\naddress that is read protected at privilege level 3 (PRIV_USER).\n\nFix this by probing read access rights at privilege level 3 and\nbranching to lws_fault if access isn't allowed.","aliases":["ECHO-2e3f-62c4-0c5f"],"modified":"2026-04-21T02:27:37.533690062Z","published":"2025-09-05T17:21:22.330Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39715.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/8bccf47adbf658293528e86960e6d6f736b1c9f7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9b6af875baba9c4679b55f4561e201485451305f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bc0a24c24ceebabb5ba65900e332233d79e625e6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e8b496c52aa0c6572d88db7cab85aeea6f9c194d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f6334f4ae9a4e962ba74b026e1d965dfdf8cbef8"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39715.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39715"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d0585d742ff2d82accd26c661c60a6d260429c4a"},{"fixed":"e8b496c52aa0c6572d88db7cab85aeea6f9c194d"},{"fixed":"8bccf47adbf658293528e86960e6d6f736b1c9f7"},{"fixed":"bc0a24c24ceebabb5ba65900e332233d79e625e6"},{"fixed":"9b6af875baba9c4679b55f4561e201485451305f"},{"fixed":"f6334f4ae9a4e962ba74b026e1d965dfdf8cbef8"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39715.json"}}],"schema_version":"1.7.5"}