CVE-2025-40250
BaseFortify
Publication date: 2025-12-04
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mlx5 | mlx5_core | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's mlx5 driver, specifically in the mlx5_irq_alloc() function. When request_irq() fails due to exhausted IRQ vectors, mlx5_irq_alloc() can mistakenly free the entire rmap (resource map), which leads to a crash when other threads try to access it. The fix ensures that only the specific IRQ mapping that failed to allocate is cleaned up, preventing removal of other valid mappings and avoiding crashes.
How can this vulnerability impact me? :
The vulnerability can cause system crashes (general protection faults) when IRQ allocation fails, potentially leading to instability or downtime in systems using the affected mlx5 driver with fwctl and rds configurations enabled. This can disrupt normal operations and affect system reliability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring system logs for error messages related to mlx5_irq_alloc failures, specifically messages indicating 'Failed to request irq. err = -28' and related kernel panic or general protection fault traces involving mlx5_core. You can check the kernel log using commands like 'dmesg | grep mlx5_irq_alloc' or 'journalctl -k | grep mlx5_irq_alloc' to find these error messages.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this issue is fixed, as the vulnerability is resolved by a commit that modifies mlx5_irq_alloc cleanup behavior. Additionally, disabling the fwctl and rds configurations, if enabled, may help avoid triggering the error until the patch is applied.