CVE-2025-40048
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the uio_hv_generic driver in the Linux kernel improperly managing the interrupt mask. The driver was setting the interrupt mask by default, but this should be controlled entirely by user space. If the driver changes the mask concurrently with user space operations, it can cause the mask bit to be set incorrectly, leading the user-mode driver to miss interrupts. This results in the user space process waiting indefinitely (hanging) because it either never receives an interrupt or misses an interrupt due to a race condition where messages in the ring buffer do not trigger interrupts as expected.
How can this vulnerability impact me? :
This vulnerability can cause user space processes that rely on interrupts from the uio_hv_generic driver to hang indefinitely. Specifically, if interrupts are missed due to improper interrupt mask handling, processes waiting for these interrupts (e.g., via pread()) may never resume, leading to system hangs or degraded functionality in applications relying on these interrupts.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the uio_hv_generic driver does not change the interrupt mask by itself and that userspace controls the interrupt mask by writing 0 or 1 to /dev/uioX. Avoid any driver logic that sets the interrupt mask automatically. Applying the patch or update that removes the logic to set the interrupt mask by default in the uio_hv_generic driver is recommended.