CVE-2025-40186
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves a flaw in the TCP Fast Open (TFO) socket handling within the tcp_conn_request() function. When a listener socket is closed while a TFO socket is being processed, improper reference counting and cleanup occur. Specifically, the function reqsk_fastopen_remove() is called incorrectly, leading to a reference count underflow and a double-free of a request socket structure (reqsk). This can cause kernel instability or crashes due to use-after-free and memory corruption.
How can this vulnerability impact me? :
This vulnerability can lead to kernel crashes or instability due to memory corruption caused by reference count underflow and double-free errors. An attacker or a faulty application could potentially exploit this to cause denial of service by crashing the system or disrupting network services that rely on TCP Fast Open.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by removing the call to reqsk_fastopen_remove() in tcp_conn_request() in the Linux kernel. To mitigate this vulnerability, you should update your Linux kernel to the version that includes this fix.