CVE-2025-40017
BaseFortify
Publication date: 2025-10-20
Last updated on: 2025-10-21
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's media iris component. An internal buffer allocated once per session was not freed when the session closed because it was not tracked properly. This caused memory to be consumed unnecessarily until the system was restarted or the process ended. The fix involves adding logic to free this untracked buffer during session close to prevent the memory leak.
How can this vulnerability impact me? :
The memory leak can lead to increased memory usage over time, potentially causing system performance degradation or instability. If the system runs many sessions without rebooting, the unfreed memory could accumulate, possibly leading to resource exhaustion or crashes.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to the version where the fix for the iris media memory leak has been applied. This ensures that the untracked internal buffer is properly freed during session close, preventing memory leaks.