CVE-2025-40032
Description
In the Linux kernel, the following vulnerability has been resolved:
PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release
The fields dma_chan_tx and dma_chan_rx of the struct pci_epf_test can be NULL even after EPF initialization. Then it is prudent to check that they have non-NULL values before releasing the channels. Add the checks in pci_epf_test_clean_dma_chan().
Without the checks, NULL pointer dereferences happen and they can lead to a kernel panic in some cases:
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050 Call trace: dma_release_channel+0x2c/0x120 (P) pci_epf_test_epc_deinit+0x94/0xc0 [pci_epf_test] pci_epc_deinit_notify+0x74/0xc0 tegra_pcie_ep_pex_rst_irq+0x250/0x5d8 irq_thread_fn+0x34/0xb8 irq_thread+0x18c/0x2e8 kthread+0x14c/0x210 ret_from_fork+0x10/0x20
[mani: trimmed the stack trace]
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing NULL checks on DMA channels in Linux kernel's PCI endpoint function test driver can cause a NULL pointer dereference and kernel panic.
Vulnerability
Description
The Linux kernel's PCI endpoint function test driver (pci-epf-test) contains a NULL pointer dereference vulnerability in the pci_epf_test_clean_dma_chan() function. The fields dma_chan_tx and dma_chan_rx of the struct pci_epf_test can be NULL even after EPF initialization, but the code did not check for NULL before releasing the DMA channels via dma_release_channel(). This oversight leads to a kernel panic when a NULL pointer is dereferenced.
Exploitation
The vulnerability is triggered during EPF deinitialization (pci_epf_test_epc_deinit), which is called when a PCI reset event occurs (e.g., via tegra_pcie_ep_pex_rst_irq). An attacker with local access or the ability to force a PCI reset on a system using this driver could trigger the panic. No authentication is required if the attacker can influence the reset signal, but the attack surface is limited to systems with the pci-epf-test driver loaded and configured.
Impact
A successful exploit results in a kernel NULL pointer dereference and subsequent kernel panic, causing a denial of service (system crash). The stack trace in the report shows the crash path: dma_release_channel called with a NULL pointer leads to the panic. The vulnerability does not allow privilege escalation or data corruption beyond the crash.
Mitigation
The fix was applied in the Linux kernel stable tree, adding NULL checks before calling dma_release_channel() in pci_epf_test_clean_dma_chan(). The commits are identified as [1] and [2] in the official kernel repository. Users should update to kernel versions containing these commits to mitigate the issue. No workaround is available if the driver is in use.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
56411f840a9b50c5ce6b6ccc2fb54ffd6006457f7fb0d1ac285afa9ea122dVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/0c5ce6b6ccc22d486cc7239ed908cb0ae5363a7bnvd
- git.kernel.org/stable/c/57f7fb0d1ac28540c0f6405c829bb9c3b89d8dbanvd
- git.kernel.org/stable/c/6411f840a9b5c47c00ca8e004733de232553870dnvd
- git.kernel.org/stable/c/85afa9ea122dd9d4a2ead104a951d318975dcd25nvd
- git.kernel.org/stable/c/fb54ffd60064c4e5139a3eb216e877b1acae1c8bnvd
News mentions
0No linked articles in our index yet.