
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-40021 was published on October 24, 2025, affecting the Linux kernel. The vulnerability relates to a missing lockdown check in the dynamicevents interface on tracefs, which should verify lockdown status similar to kprobeevents and uprobe_events interfaces (NVD).
The vulnerability involves the tracing subsystem's dynevent functionality in the Linux kernel. The issue stems from the dynamicevents interface on tracefs lacking proper lockdown status verification, despite being compatible with kprobeevents and uprobe_events interfaces. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating a low severity rating (Red Hat).
The vulnerability has been rated as low severity, primarily affecting system availability. The impact is limited to local attacks with no direct effects on confidentiality or integrity of the system (Red Hat).
For Debian systems, the fix has been implemented in version 6.16.12-2 and later releases. Red Hat has deferred fixes for affected versions of Red Hat Enterprise Linux 9 and 10. Systems running Red Hat Enterprise Linux 6, 7, and 8 are not affected and require no mitigation (Debian).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."