CVE-2025-40133
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves improper use of certain functions in the mptcp_active_enable() function. Specifically, mptcp_active_enable() uses sk_dst_get(sk)->dev, which can trigger a use-after-free (UAF) condition because it is not always called under Read-Copy-Update (RCU) protection. The fix involves using __sk_dst_get() and dst_dev_rcu() to safely access the destination device, preventing the UAF issue.
How can this vulnerability impact me? :
The vulnerability can lead to a use-after-free condition in the Linux kernel's multipath TCP (mptcp) implementation. This could potentially cause kernel crashes, system instability, or be exploited to execute arbitrary code with kernel privileges, impacting system security and reliability.