CVE-2025-40042
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's kprobe initialization. It occurs when one CPU enables kprobe functionality before the perf_events pointer is fully initialized. Another CPU can then trigger a kprobe event and attempt to access the perf_events pointer while it is still NULL, leading to a NULL pointer dereference and a kernel crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a NULL pointer dereference triggered by the race condition in kprobe initialization. This can lead to system instability, downtime, and potential loss of data or service availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for crash messages related to kprobe initialization, specifically NULL pointer dereference errors and kernel paging requests at addresses similar to those shown in the crash trace (e.g., messages containing 'kprobe_perf_func' and 'kprobe_dispatcher'). You can check the kernel log using the command: dmesg | grep -i kprobe. Additionally, monitoring for kernel crashes or oops messages related to kprobe can help detect this issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this race condition in kprobe initialization has been fixed. Until then, avoid enabling kprobe functionality or profiling features that trigger kprobe_perf_func to prevent the race condition from causing kernel crashes.