CVE-2025-40219
BaseFortify
Publication date: 2025-12-04
Last updated on: 2026-04-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves missing locking mechanisms when enabling or disabling SR-IOV (Single Root I/O Virtualization) on PCI devices. Specifically, the sriov_disable() function removes virtual functions (VFs) without proper synchronization using the pci_rescan_remove_lock, which can lead to race conditions such as double removal of devices and list corruption, especially on the s390 platform. The lack of locking means concurrent operations on PCI devices can interfere with each other, causing instability or crashes.
How can this vulnerability impact me? :
This vulnerability can cause system instability or crashes due to race conditions when removing or adding PCI virtual functions. On affected platforms like s390, it may lead to double removal of devices and corruption of internal kernel data structures, potentially resulting in kernel panics or other unpredictable behavior that could disrupt normal system operations.
What immediate steps should I take to mitigate this vulnerability?
Apply the updated Linux kernel patch that adds proper locking in sriov_disable() and sriov_add_vfs() functions to prevent race conditions during SR-IOV enable/disable operations. Avoid disabling SR-IOV on affected systems until the fix is applied to prevent potential device removal races and list corruption.