CVE-2025-40102
BaseFortify
Publication date: 2025-10-30
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's KVM on arm64 allows userspace to access and pend vCPU events for a virtual CPU (vCPU) that has not been initialized yet. This leads to KVM interpreting uninitialized garbage data when routing or injecting exceptions, which can cause the kernel to enter an illegal mode and trigger a kernel BUG or internal error. The issue arises because KVM does not reject ioctls related to vCPU events before the vCPU is properly initialized.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash or enter an unstable state due to illegal mode transitions and kernel BUGs triggered by uninitialized vCPU event handling. This could lead to denial of service or system instability in environments using KVM virtualization on arm64 architectures.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the Linux kernel logs for the specific kernel BUG related to KVM arm64 vCPU events before initialization. Look for messages containing 'kernel BUG at arch/arm64/kvm/inject_fault.c:40' or 'Internal error: Oops - BUG' related to KVM. You can use the command `dmesg | grep 'kvm'` or `journalctl -k | grep 'kvm'` to search for such errors. Additionally, monitoring for crashes or oops messages related to KVM vCPU initialization may indicate exploitation attempts.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to ensure that the Linux kernel is updated to a version where this vulnerability is fixed. The fix involves rejecting ioctls that attempt to access or pend vCPU events before the vCPU has been initialized (i.e., before KVM_ARM_VCPU_INIT). Avoid running or allowing untrusted userspace code to interact with KVM vCPU ioctls before initialization. Applying the latest kernel patches that include this fix is the recommended action.