CVE-2025-40028
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a double-free error in the Linux kernel's binder driver. When a process tries to expand its proc->dmap bitmap but fails to allocate a new one, the old bitmap is freed. However, the driver frees the same bitmap again when the process terminates, causing a double-free. This can lead to memory corruption or kernel crashes. The issue is fixed by marking proc->map as NULL after freeing it to prevent the second free.
How can this vulnerability impact me? :
This vulnerability can cause kernel memory corruption or crashes due to the double-free error. This may lead to system instability, denial of service, or potentially allow an attacker to execute arbitrary code with kernel privileges.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by updating the Linux kernel to a version where the binder driver properly marks proc->map as NULL in dbitmap_free(), preventing the double-free error. Therefore, the immediate mitigation step is to apply the kernel patch or upgrade to a fixed kernel version that includes this fix.