CVE-2025-40258
BaseFortify
Publication date: 2025-12-04
Last updated on: 2025-12-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's mptcp_schedule_work() function related to Multipath TCP (MPTCP). The issue arises from a race condition where a work is scheduled and a reference count on a socket is incremented after scheduling. However, the worker function that handles the scheduled work can run and complete before the reference count is incremented, leading to a use-after-free scenario where the socket reference count is manipulated incorrectly, potentially causing memory corruption or crashes.
How can this vulnerability impact me? :
This vulnerability can lead to use-after-free conditions in the Linux kernel, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges by exploiting the memory corruption resulting from the race condition in the MPTCP implementation.