CVE-2025-40101 Affecting kernel-uek64k-modules-desktop package, versions <0:6.12.0-106.55.4.1.el9uek


Severity

Recommended
high

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
0.02% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE9-KERNELUEK64KMODULESDESKTOP-14397794
  • published12 Dec 2025
  • disclosed30 Oct 2025

Introduced: 30 Oct 2025

CVE-2025-40101  (opens in a new tab)

How to fix?

Upgrade Oracle:9 kernel-uek64k-modules-desktop to version 0:6.12.0-106.55.4.1.el9uek or higher.
This issue was patched in ELSA-2025-28040.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-uek64k-modules-desktop package and not the kernel-uek64k-modules-desktop package as distributed by Oracle. See How to fix? for Oracle:9 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST

At the end of btrfs_load_block_group_zone_info() the first thing we do is to ensure that if the mapping type is not a SINGLE one and there is no RAID stripe tree, then we return early with an error.

Doing that, though, prevents the code from running the last calls from this function which are about freeing memory allocated during its run. Hence, in this case, instead of returning early, we set the ret value and fall through the rest of the cleanup code.

CVSS Base Scores

version 3.1