VYPR
Unrated severityNVD Advisory· Published Dec 8, 2025· Updated Apr 15, 2026

CVE-2025-40302

CVE-2025-40302

Description

In the Linux kernel, the following vulnerability has been resolved:

media: videobuf2: forbid remove_bufs when legacy fileio is active

vb2_ioctl_remove_bufs() call manipulates queue internal buffer list, potentially overwriting some pointers used by the legacy fileio access mode. Forbid that ioctl when fileio is active to protect internal queue state between subsequent read/write calls.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, vb2_ioctl_remove_bufs() can corrupt internal queue state when legacy fileio is active, leading to potential memory corruption.

Vulnerability

Description

The vulnerability resides in the Linux kernel's videobuf2 subsystem, specifically in the vb2_ioctl_remove_bufs() function [1]. This function manipulates the internal buffer list of a video buffer queue. When legacy fileio (file I/O) access mode is active, these internal pointers are also used by the read/write operations. Calling remove_bufs in this state can overwrite those pointers, corrupting the queue's internal state and leading to undefined behavior, including potential memory corruption [1].

Exploitation

Conditions

An attacker requires local access to the system and the ability to invoke the VIDIOC_REMOVE_BUFS ioctl on a video device node while a file descriptor is using the legacy fileio mode for that same device. The attack does not require authentication beyond having permission to open the device file and issue ioctl calls. The prerequisite is that the fileio mode must be active at the time of the ioctl [1].

Impact

If exploited, an attacker could cause the kernel to operate on corrupted queue state, potentially leading to memory corruption. This could result in a system crash (denial of service) or, if carefully controlled, possible arbitrary code execution in kernel context. However, the primary risk from the patch description is a kernel panic due to corrupted pointers [1].

Mitigation

The fix is included in the Linux kernel commit "27afd6e066cfd80ddbe22a4a11b99174ac89cced" [1]. The commit adds a check to vb2_ioctl_remove_bufs() that returns an error (-EBUSY) if legacy fileio is active for the queue, preventing the unsafe operation. Users should apply kernel updates from their distribution that include this commit. No workaround other than avoiding the use of legacy fileio alongside remove_bufs is available [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.