{"id":"CVE-2025-39839","summary":"batman-adv: fix OOB read/write in network-coding decode","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: fix OOB read/write in network-coding decode\n\nbatadv_nc_skb_decode_packet() trusts coded_len and checks only against\nskb-\u003elen. XOR starts at sizeof(struct batadv_unicast_packet), reducing\npayload headroom, and the source skb length is not verified, allowing an\nout-of-bounds read and a small out-of-bounds write.\n\nValidate that coded_len fits within the payload area of both destination\nand source sk_buffs before XORing.","modified":"2026-04-02T12:48:10.624133Z","published":"2025-09-19T15:26:14.688Z","related":["SUSE-SU-2025:03600-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1","openSUSE-SU-2025:20081-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39839.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1e36c6c8dc8023b4bbe9a16e819f9998b9b6a183"},{"type":"WEB","url":"https://git.kernel.org/stable/c/20080709457bc1e920eb002483d7d981d9b2ac1c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/30fc47248f02b8a14a61df469e1da4704be1a19f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5d334bce9fad58cf328d8fa14ea1fff855819863"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a67c6397fcb7e842d3c595243049940970541c48"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bb37252c9af1cb250f34735ee98f80b46be3cef1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d77b6ff0ce35a6d0b0b7b9581bc3f76d041d4087"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dce6c2aa70e94c04c523b375dfcc664d7a0a560a"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39839.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39839"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2df5278b0267c799f3e877e8eeddbb6e93cda0bb"},{"fixed":"30fc47248f02b8a14a61df469e1da4704be1a19f"},{"fixed":"1e36c6c8dc8023b4bbe9a16e819f9998b9b6a183"},{"fixed":"5d334bce9fad58cf328d8fa14ea1fff855819863"},{"fixed":"dce6c2aa70e94c04c523b375dfcc664d7a0a560a"},{"fixed":"bb37252c9af1cb250f34735ee98f80b46be3cef1"},{"fixed":"20080709457bc1e920eb002483d7d981d9b2ac1c"},{"fixed":"a67c6397fcb7e842d3c595243049940970541c48"},{"fixed":"d77b6ff0ce35a6d0b0b7b9581bc3f76d041d4087"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-39839.json"}}],"schema_version":"1.7.5"}