VYPR
Unrated severityNVD Advisory· Published Nov 12, 2025· Updated Apr 15, 2026

CVE-2025-40177

CVE-2025-40177

Description

In the Linux kernel, the following vulnerability has been resolved:

accel/qaic: Fix bootlog initialization ordering

As soon as we queue MHI buffers to receive the bootlog from the device, we could be receiving data. Therefore all the resources needed to process that data need to be setup prior to queuing the buffers.

We currently initialize some of the resources after queuing the buffers which creates a race between the probe() and any data that comes back from the device. If the uninitialized resources are accessed, we could see page faults.

Fix the init ordering to close the race.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's QAIC accelerator driver, bootlog resources were initialized after MHI buffer submission, creating a use-before-initialization race that could cause page faults.

Vulnerability

Overview

CVE-2025-40177 is a race condition in the Linux kernel's accel/qaic driver, introduced during bootlog initialization. The driver queues MHI (Modem Host Interface) buffers to receive the bootlog from the QAIC device, but some of the resources needed to process that data are only initialized after the buffers are already queued. This means that as soon as the device sends bootlog data, the driver can attempt to access uninitialized structures, leading to a use-before-initialization flaw.

Attack

Vector and Prerequisites

Exploitation requires that the QAIC device hardware is present and able to send bootlog data back to the host immediately upon buffer submission. No special privileges beyond the ability to probe the device (e.g., via driver binding) are needed. The race window exists during the probe sequence of the driver, before the driver's initialization routine completes. An attacker who controls the device (or a malicious device that sends bootlog data quickly) could trigger this race condition.

Impact

If the race is won, the driver dereferences uninitialized pointers or data structures, which can result in a kernel page fault. In a standard Linux kernel, a page fault in kernel space leads to a kernel panic (denial of service). Under rare circumstances, if the uninitialized memory is carefully controlled, an attacker might cause arbitrary code execution, though the primary impact is an exploitable denial-of-service condition that crashes the system.

Mitigation

The fix closes the race by reordering the initialization sequence: all resources needed to process bootlog data are now set up before the MHI buffers are queued [1][2][3]. This patch has been applied to the stable kernel trees and is included in updates for versions that contain the vulnerable code. Users should apply the latest stable kernel update from their distribution to remediate the issue.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.