{"id":"CVE-2025-39788","summary":"scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\n\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\nincorrectly as 0.\n\nThis is because the left hand side of the shift is 1, which is of type\nint, i.e. 31 bits wide. Shifting by more than that width results in\nundefined behaviour.\n\nFix this by switching to the BIT() macro, which applies correct type\ncasting as required. This ensures the correct value is written to\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\nwarning:\n\n    UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\n    shift exponent 32 is too large for 32-bit type 'int'\n\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\nwrite.","modified":"2026-03-20T12:43:03.152461Z","published":"2025-09-11T16:56:37.173Z","related":["SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","SUSE-SU-2025:4393-1","SUSE-SU-2025:4422-1","SUSE-SU-2025:4505-1","SUSE-SU-2025:4516-1","SUSE-SU-2025:4517-1","SUSE-SU-2025:4521-1","SUSE-SU-2026:20039-1","SUSE-SU-2026:20059-1","SUSE-SU-2026:20473-1","SUSE-SU-2026:20496-1","openSUSE-SU-2025:20081-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39788.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/01510a9e8222f11cce064410f3c2fcf0756c0a08"},{"type":"WEB","url":"https://git.kernel.org/stable/c/01aad16c2257ab8ff33b152b972c9f2e1af47912"},{"type":"WEB","url":"https://git.kernel.org/stable/c/098b2c8ee208c77126839047b9e6e1925bb35baa"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5b9f1ef293428ea9c0871d96fcec2a87c4445832"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6d53b2a134da77eb7fe65c5c7c7a3c193539a78a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c1f025da8f370a015e412b55cbcc583f91de8316"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dc8fb963742f1a38d284946638f9358bdaa0ddee"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39788.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39788"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"55f4b1f73631a0817717fe6e98517de51b4c3527"},{"fixed":"01510a9e8222f11cce064410f3c2fcf0756c0a08"},{"fixed":"098b2c8ee208c77126839047b9e6e1925bb35baa"},{"fixed":"c1f025da8f370a015e412b55cbcc583f91de8316"},{"fixed":"6d53b2a134da77eb7fe65c5c7c7a3c193539a78a"},{"fixed":"dc8fb963742f1a38d284946638f9358bdaa0ddee"},{"fixed":"5b9f1ef293428ea9c0871d96fcec2a87c4445832"},{"fixed":"01aad16c2257ab8ff33b152b972c9f2e1af47912"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39788.json"}}],"schema_version":"1.7.5"}