CVE-2025-40180
Description
In the Linux kernel, the following vulnerability has been resolved:
mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop
The cleanup loop was starting at the wrong array index, causing out-of-bounds access. Start the loop at the correct index for zero-indexed arrays to prevent accessing memory beyond the allocated array bounds.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel, the ZynqMP IPI mailbox driver had an out-of-bounds access during cleanup because a loop started at the wrong array index.
The vulnerability is in the zynqmp-ipi mailbox driver, a component that handles inter-processor communication on Xilinx Zynq UltraScale+ MPSoC platforms. The root cause is a one-off indexing error in a cleanup loop: the loop was initialised with an incorrect starting index for a zero-indexed array, causing the code to read or write memory beyond the allocated array bounds.
No authentication or special privileges are required to trigger the bug during normal driver cleanup (e.g., when the mailbox device is unbound or removed). The attack surface is local; an attacker would need the ability to load or manipulate the mailbox driver, which typically requires root access. The out-of-bounds access occurs in kernel memory, making it a potential vector for memory corruption.
An attacker who successfully exploits the out-of-bounds access could corrupt adjacent kernel data structures, potentially leading to a denial of service (system crash) or, under specific conditions, privilege escalation. The CVSS v3.1 score is 7.8 (HIGH), indicating significant local impact.
The issue was fixed in the Linux kernel with commits [1] and [2]. Users should apply the latest stable kernel updates to mitigate the vulnerability. No workarounds are provided; the fix involves adjusting the loop index to start at zero.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
3cd0cbf2713f6ab96f08ecedd0aead8197fc1Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.