CVE-2025-40032

Source
https://cve.org/CVERecord?id=CVE-2025-40032
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40032.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-40032
Downstream
Related
Published
2025-10-28T11:48:14.876Z
Modified
2026-03-12T02:19:42.854789Z
Summary
PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release
Details

In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release

The fields dmachantx and dmachanrx of the struct pciepftest can be NULL even after EPF initialization. Then it is prudent to check that they have non-NULL values before releasing the channels. Add the checks in pciepftestcleandma_chan().

Without the checks, NULL pointer dereferences happen and they can lead to a kernel panic in some cases:

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050 Call trace: dmareleasechannel+0x2c/0x120 (P) pciepftestepcdeinit+0x94/0xc0 [pciepftest] pciepcdeinitnotify+0x74/0xc0 tegrapcieeppexrstirq+0x250/0x5d8 irqthreadfn+0x34/0xb8 irqthread+0x18c/0x2e8 kthread+0x14c/0x210 retfrom_fork+0x10/0x20

[mani: trimmed the stack trace]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40032.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5ebf3fc59bd20d17df3ba26159787d13cf20d362
Fixed
6411f840a9b5c47c00ca8e004733de232553870d
Fixed
0c5ce6b6ccc22d486cc7239ed908cb0ae5363a7b
Fixed
fb54ffd60064c4e5139a3eb216e877b1acae1c8b
Fixed
57f7fb0d1ac28540c0f6405c829bb9c3b89d8dba
Fixed
85afa9ea122dd9d4a2ead104a951d318975dcd25

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40032.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.7.0
Fixed
6.1.157
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.113
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.54
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40032.json"