CVE-2025-40228
BaseFortify
Publication date: 2025-12-04
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
Apply the patch titled "mm/damon/sysfs: fix commit test damon_ctx [de]allocation" which fixes the allocation failure check and memory leak issues in the DAMON sysfs interface. This patch ensures that the damon_ctx object is properly checked for allocation failure and prevents invalid memory access and leaks.
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's DAMON sysfs interface, which dynamically allocates a damon_ctx object to test if inputs for updating online DAMON parameters are valid. The vulnerability arises because the allocation failure of this object was not checked, potentially leading to invalid memory access and memory leaks when the test succeeds. The patch fixes these issues by adding proper allocation failure checks and preventing memory leaks.
How can this vulnerability impact me? :
This vulnerability can lead to invalid memory access and memory leaks in the Linux kernel, which may cause system instability, crashes, or potential security risks due to improper handling of memory allocation failures.