CVE-2025-40223
BaseFortify
Publication date: 2025-12-04
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free and potential double-free issue in the Linux kernel's 'most' USB subsystem, specifically in the hdm_disconnect() function. The problem occurs because hdm_disconnect() calls functions that unregister a device, which may trigger the device's release function (release_mdev()) while hdm_disconnect() is still running. The original code freed certain allocations and performed extra device reference decrements, which could lead to accessing freed memory or freeing memory twice depending on the order of operations. The fix involved moving the freeing of allocations to the release function to ensure they happen only once and removing redundant reference decrements.
How can this vulnerability impact me? :
This vulnerability can lead to use-after-free or double-free conditions in the kernel, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code with kernel privileges. Such memory corruption issues can compromise system security and reliability.
What immediate steps should I take to mitigate this vulnerability?
Update the Linux kernel to a version that includes the fix for the use-after-free vulnerability in hdm_disconnect(), as the issue is resolved by moving the frees of mdev-owned allocations into release_mdev() and removing redundant put_device() calls. There are no specific mitigation commands or workarounds provided.