CVE-2025-40081
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's perf subsystem, specifically in the arm_spe component. It involves an overflow issue in the PERF_IDX2OFF() function. The problem occurs because the number of pages (nr_pages) was not properly cast to an unsigned long, which can cause an overflow when handling large AUX buffer sizes of 2 GiB or more. The fix involves casting nr_pages to unsigned long to prevent this overflow.
How can this vulnerability impact me? :
If exploited, this vulnerability could cause incorrect handling of large AUX buffer sizes in the perf subsystem, potentially leading to memory corruption or crashes in the Linux kernel on affected systems. This could impact system stability or security, especially on systems using ARM SPE features with large AUX buffers.