CVE-2025-40297
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free issue in the Linux kernel's network bridge code. It occurs due to a race condition when deleting an expired forwarding database (fdb) entry. Specifically, if Multiple Spanning Tree (MST) is enabled and VLAN filtering is disabled, the port's state can be bypassed, allowing fdb learning to happen while the port is being deleted. This leads to accessing memory that has already been freed, causing a use-after-free error.
How can this vulnerability impact me? :
The use-after-free vulnerability can lead to instability or crashes in the Linux kernel's networking stack, potentially causing denial of service or unpredictable behavior in network operations. It may also be exploitable to execute arbitrary code or escalate privileges, depending on the environment and attacker capabilities.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that your Linux kernel is updated with the fix that adds a check for the port's vlan group to prevent the MST port state bypass. Additionally, avoid having VLAN filtering disabled on bridge ports when MST is enabled, as this combination can lead to the vulnerability. Applying the latest kernel patches that address this use-after-free issue is the recommended immediate step.