CVE-2025-40255
BaseFortify
Publication date: 2025-12-04
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the Linux kernel's generic_hwtstamp_ioctl_lower() function. Specifically, the function is called with a NULL ifr pointer, which it does not expect, leading to a system crash. The issue arises in the ethtool tsconfig Netlink path through a call chain that eventually results in dereferencing a NULL pointer. The fix involves adding a NULL check for the ifr pointer and returning an error if it is NULL.
How can this vulnerability impact me? :
This vulnerability can cause a system crash due to a NULL pointer dereference in the Linux kernel. Such a crash can lead to denial of service, making the affected system unstable or unavailable until it is rebooted or recovered.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch or update to a Linux kernel version that includes the fix for this vulnerability, which adds a NULL check for kernel_cfg->ifr in generic_hwtstamp_ioctl_lower() to prevent the null pointer dereference and system crash.