CVE-2025-40130
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a data race condition in the Linux kernel's SCSI UFS core related to CPU latency PM QoS request handling. The interfaces for adding, removing, or updating CPU latency QoS requests lack internal synchronization, relying instead on a flag that does not properly prevent concurrent access. This leads to data races and list corruption, causing potential use-after-free errors when multiple threads access and modify PM QoS resources simultaneously. The fix introduces a mutex to serialize these operations and prevent such data races.
How can this vulnerability impact me? :
This vulnerability can cause data races and list corruption in the kernel's PM QoS handling, potentially leading to use-after-free errors. Such issues can cause system instability, crashes, or unpredictable behavior in systems using the affected Linux kernel components, impacting reliability and performance.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by introducing a dedicated mutex to serialize PM QoS operations in the Linux kernel, preventing data races. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix.