CVE-2025-40361
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-16

Last updated on: 2025-12-18

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: fs: ext4: change GFP_KERNEL to GFP_NOFS to avoid deadlock The parent function ext4_xattr_inode_lookup_create already uses GFP_NOFS for memory alloction, so the function ext4_xattr_inode_cache_find should use same gfp_flag.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-16
Last Modified
2025-12-18
Generated
2026-05-07
AI Q&A
2025-12-16
EPSS Evaluated
2026-01-08
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update your Linux kernel to the latest version where the fix has been applied, specifically the change from GFP_KERNEL to GFP_NOFS in the ext4 filesystem code to avoid deadlocks.


Can you explain this vulnerability to me?

This vulnerability in the Linux kernel's ext4 filesystem involves improper use of memory allocation flags. Specifically, the function ext4_xattr_inode_cache_find used GFP_KERNEL for memory allocation, which could lead to a deadlock. The fix changes this to GFP_NOFS to avoid deadlock, aligning it with the parent function ext4_xattr_inode_lookup_create that already uses GFP_NOFS.


How can this vulnerability impact me? :

This vulnerability can cause a deadlock in the Linux kernel's ext4 filesystem, potentially leading to system hangs or crashes when accessing extended attributes. This can impact system stability and availability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart