CVE-2025-40002
BaseFortify
Publication date: 2025-10-18
Last updated on: 2025-10-21
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's Thunderbolt driver. It occurs because the code uses cancel_delayed_work() to stop a delayed work item, but this function does not guarantee that the work has fully completed if it was already running. As a result, the tb_tunnel object can be deallocated while the delayed work still tries to access it, leading to a use-after-free scenario. The fix involves implementing proper reference counting to ensure the tb_tunnel remains valid during the work item's execution and prevent memory leaks.
How can this vulnerability impact me? :
This vulnerability can lead to use-after-free conditions in the Linux kernel, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges if they can trigger the race condition. It affects the reliability and security of systems using the affected Thunderbolt driver.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the use-after-free in tb_dp_dprx_work is fixed. The fix involves proper reference counting and changes in the handling of delayed work items in the thunderbolt driver, replacing cancel_delayed_work() usage with a mechanism that ensures the tb_tunnel remains valid during work item execution. Since the issue is in kernel code, applying the vendor's patch or upgrading to a fixed kernel version is the immediate step.