CVE-2025-40202
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's IPMI subsystem involves improper handling of the limit on the number of user messages. There were issues with incorrect counting and a use-after-free error. The fix restructures the message handling to perform all reference counting and user message limit checks in the receive message allocation routine, making the process cleaner and safer.
How can this vulnerability impact me? :
The vulnerability could lead to instability or security issues in the Linux kernel's IPMI subsystem due to improper message limit handling and use-after-free errors. This might result in crashes or potential exploitation by attackers to cause denial of service or other unintended behavior.