VYPR
Unrated severityNVD Advisory· Published Oct 20, 2025· Updated Apr 15, 2026

CVE-2025-40017

CVE-2025-40017

Description

In the Linux kernel, the following vulnerability has been resolved:

media: iris: Fix memory leak by freeing untracked persist buffer

One internal buffer which is allocated only once per session was not being freed during session close because it was not being tracked as part of internal buffer list which resulted in a memory leak.

Add the necessary logic to explicitly free the untracked internal buffer during session close to ensure all allocated memory is released properly.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's iris media driver, a memory leak occurs because an internal buffer allocated once per session is not freed during session close, leading to unreleased memory.

Vulnerability

Description

CVE-2025-40017 describes a memory leak in the Linux kernel's media subsystem, specifically in the iris driver. The root cause is that an internal buffer, allocated only once per session, was not tracked as part of the internal buffer list. Consequently, during session close, this buffer was never freed, resulting in a gradual memory leak over time.

Attack

Surface and Exploitation

The vulnerability is triggered through normal session lifecycle operations—opening and closing sessions on the iris device. An attacker with local access to the system can exploit this by repeatedly creating and destroying sessions, causing the untracked buffer to accumulate without release. No special privileges are required beyond the ability to interact with the media device, making it accessible to unprivileged users or malicious processes.

Impact

Successful exploitation leads to progressive memory exhaustion, potentially causing system instability or denial of service. As the leaked memory is not freed, the system may eventually run out of available memory, impacting other processes and overall system performance.

Mitigation

The issue has been addressed in the Linux kernel stable tree. The fix adds explicit deallocation of the untracked buffer during session close. Multiple stable branches have incorporated the patch, as seen in commits [1], [2], and [3]. Users are advised to update their kernels to the latest stable release containing these commits.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.