CVE-2025-40027
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a concurrency issue in the Linux kernel's 9p filesystem client. It occurs due to a race condition between two threads: one sending an invalid flush request and later cleaning it up, and another canceling all pending requests. Both threads can attempt to delete the same request from a list simultaneously, leading to a double deletion (double req put) and potentially causing a general protection fault or wild memory access. The issue was fixed by updating the status check to prevent simultaneous deletion of the same request.
How can this vulnerability impact me? :
This vulnerability can cause a general protection fault or wild memory access in the Linux kernel, potentially leading to system instability or crashes. It arises from improper handling of concurrent request deletions in the 9p filesystem client, which could be exploited to disrupt normal system operations or cause denial of service.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that fixes the concurrency issue in the 9p filesystem client, specifically the commit 74d6a5d56629 which updates the check for req->status in p9_fd_cancelled to prevent double deletion of req_list entries. This patch resolves the race condition causing the vulnerability.