CVE-2025-40270
BaseFortify
Publication date: 2025-12-06
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a potential Use-After-Free (UAF) issue in the Linux kernel's memory management related to VMA (Virtual Memory Area) readahead and swap device handling. Specifically, when the system reads swap entries from different swap devices, it may call a function (__read_swap_cache_async) without properly holding a reference to the swap device, leading to a race condition. This can cause a UAF if swapoff on one device races with swapin on another, potentially causing memory corruption or instability.
How can this vulnerability impact me? :
This vulnerability could lead to memory corruption or instability in the Linux kernel due to a Use-After-Free condition. Although it is not easy to trigger, if exploited, it could cause system crashes or unpredictable behavior, potentially affecting system reliability and security.