CVE-2025-40270Use After Free in Linux

CWE-416Use After Free15 documents6 sources
Severity
5.8MEDIUM
No vector
EPSS
0.0%
top 89.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 6
Latest updateFeb 24

Description

In the Linux kernel, the following vulnerability has been resolved: mm, swap: fix potential UAF issue for VMA readahead Since commit 78524b05f1a3 ("mm, swap: avoid redundant swap device pinning"), the common helper for allocating and preparing a folio in the swap cache layer no longer tries to get a swap device reference internally, because all callers of __read_swap_cache_async are already holding a swap entry reference. The repeated swap device pinning isn't needed on the same swap device.

Affected Packages5 packages

Linuxlinux/linux_kernel6.15.06.17.9
Debianlinux/linux_kernel< 6.17.9-1
Ubuntulinux/linux_kernel< 6.17.0-14.14
CVEListV5linux/linux78524b05f1a3e16a5d00cc9c6259c41a9d6003cea4145be7b56bfa87dce56415c3ad993071462b8a+2
debiandebian/linux< linux 6.17.9-1 (forky)

🔴Vulnerability Details

8
OSV
linux-azure vulnerabilities2026-02-24
OSV
linux-oem-6.17 vulnerabilities2026-02-17
OSV
linux-aws, linux-oracle vulnerabilities2026-02-17
OSV
linux-gcp vulnerabilities2026-02-12
OSV
linux, linux-raspi, linux-realtime vulnerabilities2026-02-12

📋Vendor Advisories

6
Ubuntu
Linux kernel (Azure) vulnerabilities2026-02-24
Ubuntu
Linux kernel (OEM) vulnerabilities2026-02-17
Ubuntu
Linux kernel (GCP) vulnerabilities2026-02-12
Ubuntu
Linux kernel vulnerabilities2026-02-12
Red Hat
kernel: mm, swap: fix potential UAF issue for VMA readahead2025-12-06