CVE-2025-40007
BaseFortify
Publication date: 2025-10-20
Last updated on: 2025-10-21
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a reference leak in the Linux kernel's netfs subsystem. Specifically, the reference counter for netfs I/O requests was initialized incorrectly, causing some requests to never be fully released if they failed early before submitting I/O. This leads to leaked references that block tasks waiting for I/O completion, causing deadlocks and outages in systems using netfs, such as Ceph clusters.
How can this vulnerability impact me? :
The vulnerability can cause server outages and deadlocks by blocking tasks indefinitely in netfs_wait_for_outstanding_io(). This happens because leaked netfs I/O requests keep internal counters positive forever, preventing proper resource cleanup and stalling operations that depend on netfs I/O completion.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that fixes the reference leak in the netfs subsystem of the Linux kernel, specifically the commit that modifies netfs_alloc_request() to initialize the reference counter to 2 and adds netfs_put_failed_request() to properly free failed requests. This patch addresses the issue of leaked references causing deadlocks. Until patched, monitor for tasks blocked in netfs_wait_for_outstanding_io() and consider kernel updates or workarounds that prevent early release of netfs_io_request objects before I/O submission.