CVE-2025-40052
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.15.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's SMB client crypto implementation. The crypto API expects input buffers to be in linear memory, but the code allocates certain buffers using kvzalloc(), which can place them in vmalloc (non-linear) memory. When many parallel encrypted reads and writes happen, this can cause a kernel BUG due to invalid memory handling in the scatterlist API, leading to crashes. The fix is to allocate these buffers with kmalloc() to ensure they are in linear memory.
How can this vulnerability impact me? :
This vulnerability can cause kernel crashes (BUGs) when performing many parallel encrypted SMB reads and writes, potentially leading to system instability or denial of service on affected Linux systems using encrypted SMB mounts.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for kernel BUG messages related to scatterlist.h and crypto operations, especially when performing many parallel reads and writes on encrypted CIFS mounts. Checking kernel logs (e.g., using 'dmesg' or 'journalctl') for messages like 'kernel BUG at include/linux/scatterlist.h' or 'Oops: invalid opcode' during CIFS operations can indicate the presence of this issue. Example commands to detect this include: 'dmesg | grep -i scatterlist', 'dmesg | grep -i cifs', or 'journalctl -k | grep -i crypto'.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to update the Linux kernel to a version where this vulnerability is fixed, which involves allocating the aead_request buffer with kmalloc() instead of kvzalloc(). Until an update is applied, reducing the number of parallel reads and writes on encrypted CIFS mounts may help avoid triggering the bug. Monitoring for kernel crashes and avoiding heavy encrypted CIFS I/O workloads can reduce the risk.