CVE-2025-40119
BaseFortify
Publication date: 2025-11-12
Last updated on: 2026-03-13
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a null pointer dereference in the Linux kernel's ext4 filesystem code. Specifically, in the ext4_mb_init() function, if the allocation of the groupinfo slab cache fails, a variable remains uninitialized. Subsequently, ext4_mb_avg_fragment_size_destroy() is called without checking for a null pointer, leading to a kernel crash due to dereferencing a null pointer.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel panic) when mounting ext4 filesystems under certain memory allocation failure conditions. This can lead to system instability, denial of service, and potential data loss or corruption if the system crashes unexpectedly.
What immediate steps should I take to mitigate this vulnerability?
Update the Linux kernel to a version where the ext4_mb_init() function includes the necessary null pointer checks in ext4_mb_avg_fragment_size_destroy() and ext4_mb_largest_free_orders_destroy() to prevent null pointer dereference. Avoid using vulnerable kernel versions and monitor for kernel oops messages related to ext4 memory allocation failures.