CVE-2025-40361
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your Linux kernel to the latest version where the fix has been applied, specifically the change from GFP_KERNEL to GFP_NOFS in the ext4 filesystem code to avoid deadlocks.
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's ext4 filesystem involves improper use of memory allocation flags. Specifically, the function ext4_xattr_inode_cache_find used GFP_KERNEL for memory allocation, which could lead to a deadlock. The fix changes this to GFP_NOFS to avoid deadlock, aligning it with the parent function ext4_xattr_inode_lookup_create that already uses GFP_NOFS.
How can this vulnerability impact me? :
This vulnerability can cause a deadlock in the Linux kernel's ext4 filesystem, potentially leading to system hangs or crashes when accessing extended attributes. This can impact system stability and availability.