CVE-2025-40026
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's KVM (Kernel-based Virtual Machine) for x86 involves improper handling of L1 intercept checks when completing userspace I/O emulation. Specifically, KVM incorrectly rechecks L1 intercepts after it has already committed to allowing L2 to perform I/O, which can cause inconsistent behavior if the I/O permission bitmaps are modified during the userspace exit. This leads to a warning and potential issues in the emulation of I/O instructions.
How can this vulnerability impact me? :
The vulnerability can cause KVM to misinterpret I/O accesses during emulation, potentially leading to warnings or errors in virtual CPU operation. This could affect the stability or correctness of virtual machines running on affected Linux kernels, possibly causing crashes or unexpected behavior in virtualized environments.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for kernel warnings related to KVM userspace I/O emulation, specifically warnings like "WARN on vcpu->arch.pio.count being non-zero" in the kernel logs. You can check the kernel log for such warnings using the command: dmesg | grep -i kvm or dmesg | grep -i 'WARN.*emulator_pio_in_out'. Additionally, monitoring for unusual behavior or crashes related to KVM userspace I/O exits may indicate the presence of this issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is resolved, as the issue is fixed in the kernel code handling KVM userspace I/O emulation. Until an update is applied, avoid toggling port I/O interception during userspace I/O exits in KVM, as this triggers the vulnerability. Monitoring and restricting untrusted userspace code that interacts with KVM I/O emulation can also reduce risk.