VYPR
Unrated severityNVD Advisory· Published Nov 12, 2025· Updated Apr 15, 2026

CVE-2025-40180

CVE-2025-40180

Description

In the Linux kernel, the following vulnerability has been resolved:

mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop

The cleanup loop was starting at the wrong array index, causing out-of-bounds access. Start the loop at the correct index for zero-indexed arrays to prevent accessing memory beyond the allocated array bounds.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, the ZynqMP IPI mailbox driver had an out-of-bounds access during cleanup because a loop started at the wrong array index.

The vulnerability is in the zynqmp-ipi mailbox driver, a component that handles inter-processor communication on Xilinx Zynq UltraScale+ MPSoC platforms. The root cause is a one-off indexing error in a cleanup loop: the loop was initialised with an incorrect starting index for a zero-indexed array, causing the code to read or write memory beyond the allocated array bounds.

No authentication or special privileges are required to trigger the bug during normal driver cleanup (e.g., when the mailbox device is unbound or removed). The attack surface is local; an attacker would need the ability to load or manipulate the mailbox driver, which typically requires root access. The out-of-bounds access occurs in kernel memory, making it a potential vector for memory corruption.

An attacker who successfully exploits the out-of-bounds access could corrupt adjacent kernel data structures, potentially leading to a denial of service (system crash) or, under specific conditions, privilege escalation. The CVSS v3.1 score is 7.8 (HIGH), indicating significant local impact.

The issue was fixed in the Linux kernel with commits [1] and [2]. Users should apply the latest stable kernel updates to mitigate the vulnerability. No workarounds are provided; the fix involves adjusting the loop index to start at zero.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.