-

CVE-2025-40032

In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release

The fields dma_chan_tx and dma_chan_rx of the struct pci_epf_test can be
NULL even after EPF initialization. Then it is prudent to check that
they have non-NULL values before releasing the channels. Add the checks
in pci_epf_test_clean_dma_chan().

Without the checks, NULL pointer dereferences happen and they can lead
to a kernel panic in some cases:

  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050
  Call trace:
   dma_release_channel+0x2c/0x120 (P)
   pci_epf_test_epc_deinit+0x94/0xc0 [pci_epf_test]
   pci_epc_deinit_notify+0x74/0xc0
   tegra_pcie_ep_pex_rst_irq+0x250/0x5d8
   irq_thread_fn+0x34/0xb8
   irq_thread+0x18c/0x2e8
   kthread+0x14c/0x210
   ret_from_fork+0x10/0x20

[mani: trimmed the stack trace]
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 6411f840a9b5c47c00ca8e004733de232553870d
Version 5ebf3fc59bd20d17df3ba26159787d13cf20d362
Status affected
Version < 0c5ce6b6ccc22d486cc7239ed908cb0ae5363a7b
Version 5ebf3fc59bd20d17df3ba26159787d13cf20d362
Status affected
Version < fb54ffd60064c4e5139a3eb216e877b1acae1c8b
Version 5ebf3fc59bd20d17df3ba26159787d13cf20d362
Status affected
Version < 57f7fb0d1ac28540c0f6405c829bb9c3b89d8dba
Version 5ebf3fc59bd20d17df3ba26159787d13cf20d362
Status affected
Version < 85afa9ea122dd9d4a2ead104a951d318975dcd25
Version 5ebf3fc59bd20d17df3ba26159787d13cf20d362
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.7
Status affected
Version < 5.7
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.157
Status unaffected
Version <= 6.6.*
Version 6.6.113
Status unaffected
Version <= 6.12.*
Version 6.12.54
Status unaffected
Version <= 6.17.*
Version 6.17.3
Status unaffected
Version <= *
Version 6.18
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.134
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String