๐Ÿ” CVE Alert

CVE-2025-40211

UNKNOWN 0.0

ACPI: video: Fix use-after-free in acpi_video_switch_brightness()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ACPI: video: Fix use-after-free in acpi_video_switch_brightness() The switch_brightness_work delayed work accesses device->brightness and device->backlight, freed by acpi_video_dev_unregister_backlight() during device removal. If the work executes after acpi_video_bus_unregister_backlight() frees these resources, it causes a use-after-free when acpi_video_switch_brightness() dereferences device->brightness or device->backlight. Fix this by calling cancel_delayed_work_sync() for each device's switch_brightness_work in acpi_video_bus_remove_notify_handler() after removing the notify handler that queues the work. This ensures the work completes before the memory is freed. [ rjw: Changelog edit ]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 21, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
8ab58e8e7e097bae5fe39cbc67eb93a91f7134b7 < 3f803ccf5a0c043e7c8b83f6665b082401fc8bee 8ab58e8e7e097bae5fe39cbc67eb93a91f7134b7 < ba1704316492a0496c69334338ea1fdbf4c2fd34 8ab58e8e7e097bae5fe39cbc67eb93a91f7134b7 < bc78a4f51d548c1ccc3d1967c2b394bf687c86e9 8ab58e8e7e097bae5fe39cbc67eb93a91f7134b7 < a63a5b6fb508d78fe57ae3b159d9ef3af7ba80e9 8ab58e8e7e097bae5fe39cbc67eb93a91f7134b7 < 4e85246ec0d019dfba86ba54d841ef6694f97149 8ab58e8e7e097bae5fe39cbc67eb93a91f7134b7 < de5fc93275a4a459fe2f7cb746984f2ab3e8292a 8ab58e8e7e097bae5fe39cbc67eb93a91f7134b7 < 293125536ef5521328815fa7c76d5f9eb1635659 8ab58e8e7e097bae5fe39cbc67eb93a91f7134b7 < 8f067aa59430266386b83c18b983ca583faa6a11
Linux / Linux
3.17

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/3f803ccf5a0c043e7c8b83f6665b082401fc8bee git.kernel.org: https://git.kernel.org/stable/c/ba1704316492a0496c69334338ea1fdbf4c2fd34 git.kernel.org: https://git.kernel.org/stable/c/bc78a4f51d548c1ccc3d1967c2b394bf687c86e9 git.kernel.org: https://git.kernel.org/stable/c/a63a5b6fb508d78fe57ae3b159d9ef3af7ba80e9 git.kernel.org: https://git.kernel.org/stable/c/4e85246ec0d019dfba86ba54d841ef6694f97149 git.kernel.org: https://git.kernel.org/stable/c/de5fc93275a4a459fe2f7cb746984f2ab3e8292a git.kernel.org: https://git.kernel.org/stable/c/293125536ef5521328815fa7c76d5f9eb1635659 git.kernel.org: https://git.kernel.org/stable/c/8f067aa59430266386b83c18b983ca583faa6a11