CVE-2025-40347
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
Apply the fix that adjusts enetc_lock_mdio to prevent recursive lock acquisition, which avoids the deadlock. This involves updating the Linux kernel to a version where this issue is resolved.
Can you explain this vulnerability to me?
This vulnerability is a deadlock issue in the Linux kernel's enetc network driver. It occurs due to recursive acquisition of a read lock called enetc_mdio_lock. Specifically, when the enetc_poll function acquires the read lock, a higher-priority writer tries to acquire the same lock and causes preemption. The writer waits because the read lock is held, but the readers cannot reacquire the lock because the writer is waiting, leading to a deadlock and thread hang. The issue was fixed by changing enetc_lock_mdio to prevent recursive lock acquisition.
How can this vulnerability impact me? :
This vulnerability can cause the affected system to hang or become unresponsive due to a deadlock in the network driver. This can lead to degraded network performance or complete loss of network connectivity on systems using the LS1028A platform with the affected Linux kernel, potentially impacting system stability and availability.