CVE-2025-40010
Description
In the Linux kernel, the following vulnerability has been resolved:
afs: Fix potential null pointer dereference in afs_put_server
afs_put_server() accessed server->debug_id before the NULL check, which could lead to a null pointer dereference. Move the debug_id assignment, ensuring we never dereference a NULL server pointer.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's AFS filesystem, afs_put_server() could dereference a NULL server pointer when accessing debug_id before the NULL check.
Vulnerability
In the Linux kernel's AFS (Andrew File System) client, the function afs_put_server() contained a null pointer dereference vulnerability. The code accessed server->debug_id before performing a NULL check on the server pointer. If server is NULL, this would cause a kernel crash or undefined behavior.
Exploitation
An attacker would need to trigger a code path that calls afs_put_server() with a NULL server pointer. This could occur during error handling or cleanup routines in the AFS code. No special privileges are required beyond the ability to interact with the AFS filesystem, but the exact attack surface depends on the specific kernel configuration and usage scenario.
Impact
A successful exploitation leads to a denial of service (kernel panic or oops) due to the null pointer dereference. The vulnerability does not appear to allow privilege escalation or arbitrary code execution based on the description.
Mitigation
The fix moves the debug_id assignment after the NULL check, ensuring the pointer is valid before dereferencing. The patch has been applied to the Linux kernel stable tree [1][2]. Users should update to a kernel version containing the fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
57b8381f3c405cab278cead49a13dbc5e20c741782c44bb849158c6bb2451Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/41782c44bb8431c43043129ae42f2ba614938479nvd
- git.kernel.org/stable/c/7b8381f3c405b864a814d747e526e078c3ef4bc2nvd
- git.kernel.org/stable/c/9158c6bb245113d4966df9b2ba602197a379412envd
- git.kernel.org/stable/c/a13dbc5e20c7284b82afe6f08debdecf51d2ca04nvd
- git.kernel.org/stable/c/cab278cead49a547ac84c3e185f446f381303eaenvd
News mentions
0No linked articles in our index yet.