CVE-2025-40016
BaseFortify
Publication date: 2025-10-20
Last updated on: 2026-04-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's uvcvideo media driver involves improper handling of invalid or duplicate entity IDs in USB Video Class (UVC) devices. According to the UVC 1.1+ specification, each unit and terminal must have a unique non-zero ID. Previously, entities with invalid or zero IDs were ignored, which caused compatibility issues with some cameras and could lead to warnings or errors due to entities referring to themselves or invalid chains. The fix marks invalid entities with a special ID (UVC_INVALID_ENTITY_ID) to prevent these issues and improve stability.
How can this vulnerability impact me? :
This vulnerability can cause instability or errors in the Linux kernel when handling certain USB video devices that have invalid or duplicate entity IDs. It may lead to warnings, broken device functionality, or kernel warnings/errors when using incompatible cameras or devices that do not follow the UVC specification properly. Fixing this issue improves device compatibility and prevents kernel warnings or crashes related to these invalid entity IDs.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for warnings related to UVC entities with invalid or zero IDs. Specifically, look for messages such as 'Entity type for entity Output/Input X was not initialized!' or warnings from media_create_pad_link in the kernel log (dmesg). You can use the command 'dmesg | grep -i uvcvideo' or 'dmesg | grep -i media_create_pad_link' to find relevant warnings indicating the presence of invalid UVC entity IDs.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is resolved, as the fix involves marking invalid UVC entities with UVC_INVALID_ENTITY_ID to prevent issues caused by zero or duplicated IDs. Until the update is applied, avoid using incompatible or non-compliant UVC devices that may trigger this issue.