CVE-2025-40230
BaseFortify
Publication date: 2025-12-04
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel when handling memory error injection on a Transparent Huge Page (THP) mapped to userspace on an x86 server. Normally, if a hardware-poisoned THP is accessed, the affected process should be terminated. However, due to the way the kernel splits the THP during error handling, it reads pages in the THP to identify zero-filled pages. This reading triggers a second machine check exception (#MC) inside the kernel before the initial memory failure handling completes, causing a kernel panic instead of safely terminating the process. The fix prevents accessing the poisoned page during this zero-page identification, avoiding the second machine check and kernel panic.
How can this vulnerability impact me? :
This vulnerability can cause the entire Linux kernel to panic (crash) when a hardware-poisoned Transparent Huge Page is accessed, instead of just terminating the affected userspace process. This kernel panic leads to system downtime and potential data loss or service interruption, impacting system stability and availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a kernel panic triggered by a Machine Check Exception (MCE) when performing memory error injection on a Transparent Huge Page (THP) mapped to userspace on an x86 server. Detection involves monitoring for kernel panic logs with MCE hardware error messages similar to the following: mce: [Hardware Error]: CPU 0: Machine Check Exception: f Bank 3: bd80000000070134 mce: [Hardware Error]: RIP 10:<ffffffff8372f8bc> {memchr_inv+0x4c/0xf0} Kernel panic - not syncing: Fatal local machine check You can use the command `dmesg` or check `/var/log/kern.log` or `/var/log/messages` for such MCE errors and kernel panic traces. Additionally, running `mcelog --ascii` on the logged MCE data can help interpret the hardware error details.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed. The fix prevents the kernel panic by avoiding access to poisoned pages during zeropage identification when splitting THPs. Until the patch is applied, monitor for kernel panics related to MCEs and consider disabling Transparent Huge Pages (THP) as a temporary workaround to reduce the risk of triggering this issue.