CVE-2025-40134
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.6.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's device mapper (dm) subsystem. It occurs when the dm device suspend operation is called before the device's table (mapping) has finished loading. This can cause a NULL pointer dereference because the suspend code assumes the table is loaded and tries to access it, but it is still NULL. The issue leads to a kernel crash (NULL pointer dereference) due to accessing invalid memory during suspend operations.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a NULL pointer dereference when the device mapper suspend operation is triggered prematurely. This can lead to system instability, denial of service, or unexpected reboots, impacting availability and reliability of systems using the affected kernel.
What immediate steps should I take to mitigate this vulnerability?
Apply the fix that checks for a valid device mapper table before performing request-based suspend and waiting for target I/O. This prevents the NULL pointer dereference by skipping table-dependent suspend steps when the table is not loaded. Ensure your Linux kernel is updated to a version that includes this fix.