CVE-2025-40105
BaseFortify
Publication date: 2025-10-30
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's handling of disconnected dentries (directory entries) during the unmount process. When a user calls open_by_handle_at() on an inode not cached, a disconnected dentry may be created. If this dentry is a directory, the kernel tries to reconnect it to the dentry tree. Due to reasons like filesystem corruption or race conditions, the kernel might create a new dentry that is not marked as disconnected even though its parent is disconnected. This inconsistency causes these dentries to be leaked in memory because they are not properly reclaimed. If an unmount occurs before memory reclaim, it leads to the "Busy inodes after unmount" bug. The fix ensures all dentries under a disconnected parent are also marked disconnected to prevent this leak.
How can this vulnerability impact me? :
This vulnerability can cause memory leaks in the Linux kernel due to leaked disconnected dentries that are not properly reclaimed. This can lead to the "Busy inodes after unmount" bug, where inodes remain busy after unmounting a filesystem, potentially causing system instability or resource exhaustion.