CVE-2025-40021
Description
In the Linux kernel, the following vulnerability has been resolved:
tracing: dynevent: Add a missing lockdown check on dynevent
Since dynamic_events interface on tracefs is compatible with kprobe_events and uprobe_events, it should also check the lockdown status and reject if it is set.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing lockdown check in Linux kernel dynevent interface allows bypassing security restrictions via dynamic_events on tracefs.
Root
Cause
The Linux kernel's dynevent interface, which provides dynamic event creation through tracefs, lacked a lockdown check. While similar interfaces like kprobe_events and uprobe_events already enforced lockdown, dynevent did not, allowing creation and modification of dynamic events even when the system was in lockdown mode [1][2].
Exploitation
An attacker with local access can write to the dynamic_events file in tracefs to create or modify kprobes, uprobes, or other dynamic events. The lockdown mechanism is designed to prevent such modifications when the kernel is in a secure state, but this oversight allowed bypassing that protection [3]. No authentication beyond local file write access is needed.
Impact
By exploiting this missing check, an attacker can create arbitrary kprobes or uprobes, which can be used to monitor kernel functions, modify execution flow, or leak sensitive kernel memory. This undermines the integrity guarantees provided by the lockdown feature and can lead to privilege escalation or information disclosure [4].
Mitigation
The fix adds a security_locked_down(LOCKDOWN_TRACEFS) check to the dynevent code path, ensuring consistency with other tracefs interfaces. The patch has been applied to the stable kernel trees and is included in releases starting from version 6.12. Administrators should update their kernels to include this commit [1][2][3][4].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
7f3ac1f4eaba50d41604d2d5307b1f63b5f863887f3814c0e573b1e39edfcb47c4e06687a456c32e3c431Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- git.kernel.org/stable/c/07b1f63b5f86765793fab44d3d4c2be681cddafbnvd
- git.kernel.org/stable/c/0d41604d2d53c1abe27fefb54b37a8f6642a4d74nvd
- git.kernel.org/stable/c/3887f3814c0e770e6b73567fe0f83a2c01a6470cnvd
- git.kernel.org/stable/c/456c32e3c4316654f95f9d49c12cbecfb77d5660nvd
- git.kernel.org/stable/c/573b1e39edfcb7b4eecde0f1664455a1f4462eeenvd
- git.kernel.org/stable/c/b47c4e06687a5a7b6c6ef4bd303fcfe4430b26bbnvd
- git.kernel.org/stable/c/f3ac1f4eaba58e57943efa3e8b8d71fa7aab0abfnvd
News mentions
0No linked articles in our index yet.