CVE-2025-40037
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's simplefb framebuffer driver. It occurs because the pm_domain cleanup cannot be managed by devres due to the way memory is allocated and freed for the simplefb_par structure. The cleanup function simplefb_detach_genpds() was being called after the memory it accessed was already freed, leading to dereferencing invalid pointers and causing kernel crashes on affected systems, such as the M2 Mac mini running certain Linux kernels.
How can this vulnerability impact me? :
This vulnerability can cause kernel crashes or instability on affected systems, particularly those using the simplefb framebuffer driver on Linux kernels like the downstream asahi kernel on M2 Mac mini hardware. The use-after-free bug can lead to system crashes or denial of service due to invalid memory access during device removal or cleanup operations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for use-after-free errors related to simplefb_detach_genpds(). Specifically, look for KASAN (Kernel Address Sanitizer) slab-use-after-free messages in dmesg or journalctl logs. You can use commands like 'dmesg | grep simplefb_detach_genpds' or 'journalctl -k | grep KASAN' to identify such errors.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the fix for this use-after-free vulnerability in simplefb_detach_genpds(), such as kernel version 6.16.3-asahi+ with the patch applied. Avoid using vulnerable kernel versions on affected hardware (e.g., M2 Mac mini) until patched. There are no other specific mitigation steps detailed.