CVE-2025-40160 — Always-Incorrect Control Flow Implementation in Linux
Severity
3.2LOWOSV
No vectorEPSS
0.0%
top 94.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 12
Latest updateApr 9
Description
In the Linux kernel, the following vulnerability has been resolved:
xen/events: Return -EEXIST for bound VIRQs
Change find_virq() to return -EEXIST when a VIRQ is bound to a
different CPU than the one passed in. With that, remove the BUG_ON()
from bind_virq_to_irq() to propogate the error upwards.
Some VIRQs are per-cpu, but others are per-domain or global. Those must
be bound to CPU0 and can then migrate elsewhere. The lookup for
per-domain and global will probably fail when migrated off CPU…
Affected Packages5 packages
▶CVEListV5linux/linux62cc5fc7b2e0218144e162afb8191db9b924b5e6 — 612ef6056855c0aacb9b25d1d853c435754483f7+4