CVE-2025-40160
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's handling of virtual interrupts (VIRQs) in the xen/events subsystem. Specifically, the function find_virq() was changed to return an error code (-EEXIST) when a VIRQ is bound to a different CPU than the one requested, instead of causing a fatal error (BUG_ON()). Some VIRQs are per-CPU, while others are per-domain or global and must initially be bound to CPU0 but can migrate later. Previously, attempts to bind a per-domain or global VIRQ a second time could cause a fatal error due to lookup failures when migrated off CPU0. The fix makes this non-fatal by returning -EEXIST, preventing crashes and improving error propagation.
How can this vulnerability impact me? :
This vulnerability could cause the Linux kernel to crash or behave unexpectedly when handling certain virtual interrupts that migrate between CPUs, due to fatal errors triggered by improper binding checks. This could lead to system instability or denial of service in environments using the affected xen/events subsystem. The fix prevents these fatal errors by properly handling the binding of VIRQs, improving system stability.