CVE-2025-40064
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free (UAF) bug in the Linux kernel's smc networking code, specifically in the function __pnet_find_base_ndev(). It occurs when a network device (net_device) is freed but still accessed later during a connect() operation. The problem arises because the reference count of the device is not properly held before certain function calls, leading to the device being freed prematurely and then accessed, causing memory corruption or crashes.
How can this vulnerability impact me? :
This use-after-free vulnerability can lead to kernel crashes, memory corruption, or potentially allow an attacker to execute arbitrary code with kernel privileges. This can compromise system stability and security, potentially allowing privilege escalation or denial of service.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been fixed in the Linux kernel by holding the device's reference count before calling smc_pnet_find_ism_resource() and smc_pnet_find_roce_resource(), using __sk_dst_get() and dst_dev_rcu() in these functions to prevent use-after-free. Immediate mitigation steps include updating your Linux kernel to a version that includes this fix.