CVE-2025-40237
BaseFortify
Publication date: 2025-12-04
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.17.0-rc6 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's filesystem notification system (fs/notify) when calling intotify_show_fdinfo() on a file descriptor watching an overlayfs inode while the overlayfs is being unmounted. During this process, a race condition can cause a NULL pointer dereference because the inode's superblock root (i_sb->s_root) is set to NULL during unmount, but another thread may still try to access it. This leads to a general protection fault and kernel crash. The issue is fixed by protecting the call to exportfs_encode_fid() with a lock to prevent accessing the inode after it has been unmounted.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash (general protection fault) due to a NULL pointer dereference, potentially leading to system instability or denial of service. If an attacker can trigger this race condition, they might cause the system to become unresponsive or crash unexpectedly.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by protecting the call to exportfs_encode_fid() from show_mark_fhandle() with the s_umount lock to prevent dereferencing a NULL pointer during overlayfs unmount. Immediate mitigation steps include updating the Linux kernel to a version that includes this fix.