CVE-2025-40184
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16.0-rc7 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's KVM module for arm64 architecture. When running with transparent huge pages and a specific debug configuration (CONFIG_NVHE_EL2_DEBUG), the debug checking in the function assert_host_shared_guest() fails during the launch of a non-primary (np) guest virtual machine. This failure triggers a WARN_ON() which causes a kernel panic. The root cause is that the debug checking incorrectly assumes memory mappings are single pages, but they may be block mappings (huge pages). The fix updates the debug checking to not verify the size and assume the correct size instead, preventing the panic.
How can this vulnerability impact me? :
This vulnerability can cause a kernel panic when launching np-guests under certain configurations, leading to system crashes and downtime. This can disrupt services running on affected systems, potentially causing loss of availability and requiring system reboots to recover.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for kernel panic messages related to KVM on arm64 with transparent huge pages and CONFIG_NVHE_EL2_DEBUG enabled. Specifically, look for WARN_ON() panics with messages similar to 'nVHE hyp BUG' and call traces involving __kvm_nvhe_assert_host_shared_guest() and __pkvm_host_relax_perms_guest(). Checking dmesg or journalctl logs for these kernel panic traces can help identify the issue. Example commands to check logs include: 'dmesg | grep -i kvm' or 'journalctl -k | grep -i kvm'.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed, as the issue is resolved by correcting debug checking in the kernel code for np-guests using huge mappings. Until an update is applied, avoid running np-guests with transparent huge pages enabled and CONFIG_NVHE_EL2_DEBUG active, as these conditions trigger the panic. Monitoring for kernel panics and avoiding configurations that trigger the bug are recommended interim steps.