PatchSiren cyber security CVE debrief
CVE-2024-25739 Linux CVE debrief
CVE-2024-25739 affects the Linux kernel’s UBI code path in drivers/mtd/ubi/vtbl.c. The issue is a missing check for ubi->leb_size in create_empty_lvol, which can lead to an attempt to allocate zero bytes and crash the kernel. The CVE was published on 2024-02-12 and the record was later modified on 2026-05-12.
- Vendor
- Linux
- Product
- CVE-2024-25739
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2024-02-12
- Original CVE updated
- 2026-05-12
- Advisory published
- 2024-02-12
- Advisory updated
- 2026-05-12
Who should care
Linux kernel maintainers, distro security teams, and operators of systems that use the UBI/MTD storage stack should review this issue. Embedded and storage-focused deployments are the most relevant audience because the vulnerable code is in the UBI volume table path.
Technical summary
The CVE record states that create_empty_lvol in drivers/mtd/ubi/vtbl.c can attempt to allocate zero bytes because ubi->leb_size is not checked. The resulting failure mode is a crash, so the primary impact is availability rather than confidentiality or integrity. NVD classifies the issue as CVSS 3.1 5.5 MEDIUM with vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H and CWE-754.
Defensive priority
Medium priority. The issue is a local availability problem in kernel code, but it affects core storage functionality and can crash the system when the vulnerable path is reached.
Recommended defensive actions
- Apply the upstream or stable Linux kernel fix referenced in the CVE record.
- Prioritize upgrades on systems that use UBI/MTD, especially embedded or appliance-style deployments.
- Review downstream vendor advisories and backport status for affected kernel branches.
- Validate that your deployed kernel is newer than the vulnerable range ending at 6.7.4.
- Monitor for unexpected kernel crashes in environments that exercise UBI volume creation paths.
Evidence notes
This debrief is based on the CVE description and the official references listed in the record, including the upstream Linux commit, a stable branch commit, a syzkaller discussion, Debian LTS notices, a kernel mailing list post, and a Siemens CERT advisory. No exploit method or unsupported impact claims are included.
Official resources
-
CVE-2024-25739 CVE record
CVE.org
-
CVE-2024-25739 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
- Source reference
- Source reference
- Source reference
-
Source reference
[email protected] - Mailing List
-
Source reference
0b142b55-0307-4c5a-b3c9-f314f3fb7c5e
Publicly disclosed in the CVE record on 2024-02-12. The record was modified on 2026-05-12; that date reflects a metadata update, not the original disclosure date.