CVE-2025-40327
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the cpu-clock usage by the async-profiler tool, which can cause the system to hang. The issue is due to a recursion deadlock in the hrtimer code: the __perf_event_overflow() callback, invoked from the hrtimer handler for cpu-clock events, tries to stop the event by calling cpu_clock_event_stop(), which cancels the hrtimer. This cancellation leads to a recursion into the hrtimer code from within the hrtimer handler, causing a deadlock and system hang. The fix involves using hrtimer_try_to_cancel() instead and setting a flag to properly stop the event without causing recursion.
How can this vulnerability impact me? :
This vulnerability can cause the system to hang when cpu-clock usage is triggered by the async-profiler tool. A system hang means the affected Linux system could become unresponsive, potentially leading to downtime, disruption of services, and loss of productivity until the system is rebooted or the issue is resolved.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by updating the Linux kernel to a version that includes the patch replacing htimer_cancel() with hrtimer_try_to_cancel() and setting the PERF_HES_STOPPED flag to prevent the deadlock. Therefore, the immediate mitigation step is to update your Linux kernel to the fixed version that resolves this issue.