CVE-2025-40038
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
| qemu | qemu | * |
| kvm | kvm | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's KVM (Kernel-based Virtual Machine) SVM (Secure Virtual Machine) module. Specifically, it concerns the handling of VM-Exit events where the next instruction pointer (RIP) is invalid. The vulnerability arises because the fastpath emulation for certain instructions (WRMSR and HLT) is skipped if the next RIP isn't valid, but in such cases, the system must decode and emulate the instruction by reading guest memory. Reading guest memory can cause faults or sleep, which is disallowed in the fastpath context where interrupts are disabled. This can lead to a bug where a sleeping function is called from an invalid context, potentially causing system instability or crashes. The fix ensures that the fastpath is skipped properly and the instruction is emulated safely.
How can this vulnerability impact me? :
This vulnerability can impact system stability and reliability when running virtual machines using KVM on affected Linux kernels. If exploited or triggered, it may cause kernel crashes or unexpected behavior due to improper handling of instruction emulation during VM-Exit events. This could lead to denial of service or disruption of virtualized environments.