CVE-2025-40228
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-12-04

Last updated on: 2025-12-04

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: catch commit test ctx alloc failure Patch series "mm/damon/sysfs: fix commit test damon_ctx [de]allocation". DAMON sysfs interface dynamically allocates and uses a damon_ctx object for testing if given inputs for online DAMON parameters update is valid. The object is being used without an allocation failure check, and leaked when the test succeeds. Fix the two bugs. This patch (of 2): The damon_ctx for testing online DAMON parameters commit inputs is used without its allocation failure check. This could result in an invalid memory access. Fix it by directly returning an error when the allocation failed.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-04
Last Modified
2025-12-04
Generated
2026-05-07
AI Q&A
2025-12-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

Apply the patch titled "mm/damon/sysfs: fix commit test damon_ctx [de]allocation" which fixes the allocation failure check and memory leak issues in the DAMON sysfs interface. This patch ensures that the damon_ctx object is properly checked for allocation failure and prevents invalid memory access and leaks.


Can you explain this vulnerability to me?

This vulnerability involves the Linux kernel's DAMON sysfs interface, which dynamically allocates a damon_ctx object to test if inputs for updating online DAMON parameters are valid. The vulnerability arises because the allocation failure of this object was not checked, potentially leading to invalid memory access and memory leaks when the test succeeds. The patch fixes these issues by adding proper allocation failure checks and preventing memory leaks.


How can this vulnerability impact me? :

This vulnerability can lead to invalid memory access and memory leaks in the Linux kernel, which may cause system instability, crashes, or potential security risks due to improper handling of memory allocation failures.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart