VYPR
Unrated severityNVD Advisory· Published Nov 12, 2025· Updated Apr 15, 2026

CVE-2025-40202

CVE-2025-40202

Description

In the Linux kernel, the following vulnerability has been resolved:

ipmi: Rework user message limit handling

The limit on the number of user messages had a number of issues, improper counting in some cases and a use after free.

Restructure how this is all done to handle more in the receive message allocation routine, so all refcouting and user message limit counts are done in that routine. It's a lot cleaner and safer.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free and improper message counting bug in the Linux kernel's IPMI driver, fixed by restructuring user message limit handling.

Vulnerability

CVE-2025-40202 is a vulnerability in the Linux kernel's IPMI (Intelligent Platform Management Interface) driver. The issue stems from flawed handling of the user message limit, which could lead to improper counting of messages in some cases and, critically, a use-after-free condition [1][2].

Exploitation

To exploit this flaw, an attacker would need local access to the system and the ability to interact with the IPMI subsystem, sending messages to exhaust or manipulate the message limit counter. The use-after-free occurs when the message limit count is decremented incorrectly, allowing a freed memory region to be accessed [1].

Impact

A successful exploit could allow an attacker to cause a denial of service (system crash) or potentially escalate privileges, as use-after-free vulnerabilities often enable arbitrary code execution within the kernel context [1][2].

Mitigation

The fix restructures the message allocation routine to handle both reference counting and user message counts in a unified, safer way [1]. Users should apply the kernel patch from the stable repository to eliminate the risk.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

5

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.