CVE-2025-40199
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's page_pool code, specifically related to the PP_MAGIC_MASK definition. On some 32-bit architectures, the mask was set too wide, causing false positives in the page_pool_page_is_pp() check, which leads to system crashes during boot. The issue arises because arbitrary kernel pointers can be mistaken for page_pool-tagged pages. The fix adjusts the mask to avoid these false positives by relying on kernel pointers being above PAGE_OFFSET and modifying the PP_DMA_INDEX_MASK accordingly. If this is not possible due to architecture constraints, the dma_index storage is disabled to prevent crashes.
How can this vulnerability impact me? :
This vulnerability can cause system crashes on boot for affected 32-bit architectures, leading to system instability or failure to start properly. It affects the kernel's memory management subsystem, which could disrupt normal operation and availability of the system.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by a patch that fixes the PP_MAGIC_MASK definition in the Linux kernel to avoid crashes on some 32-bit architectures. Immediate mitigation involves applying the updated kernel patch that corrects the PP_DMA_INDEX_BITS mask as described. Disabling the check in page_pool_is_pp() is not recommended as it causes malfunction. Therefore, update your Linux kernel to the fixed version that includes this patch.