CVE-2025-40188
Description
In the Linux kernel, the following vulnerability has been resolved:
pwm: berlin: Fix wrong register in suspend/resume
The 'enable' register should be BERLIN_PWM_EN rather than BERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there will be cpu exception then kernel panic during suspend/resume.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Berlin PWM driver uses wrong register in suspend/resume, causing kernel panic.
Root
Cause
In the Linux kernel's Berlin PWM driver, the suspend and resume callbacks reference the constant BERLIN_PWM_ENABLE instead of the correct BERLIN_PWM_EN. This is a plain coding error — the wrong register offset is used when saving and restoring the PWM enable state during system power transitions [1].
Exploitation
An attacker does not need to actively exploit this bug; it is triggered automatically whenever the system enters a suspend/resume cycle on hardware that uses the Berlin PWM controller. No special privileges or network access are required — the flaw resides in kernel driver code that executes during normal power management events.
Impact
Because the driver accesses an invalid memory address (the value at offset BERLIN_PWM_ENABLE is not a valid PWM register), the kernel triggers a CPU exception, which leads to a system panic [1]. This results in a denial of service: the machine crashes (or hangs) during suspend or resume, potentially losing unsaved data and forcing a hard reset.
Mitigation
Patches have been merged into the Linux kernel stable tree; referencing the proposed fix, commit fd017aabd427, corrects the register name [1][2][3][4]. Administrators should apply the latest kernel updates for their distribution to eliminate the panic.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
8da3cadb8b0f35419c86ea1349ee5eb3d0921fd017aabd427dc3a1c6237e7d9457e6258756cef9e4425143a4b9d027e40Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/3a4b9d027e4061766f618292df91760ea64a1fccnvd
- git.kernel.org/stable/c/5419c86ea134b8a5b8126f55fa5bc1ad7b3ca444nvd
- git.kernel.org/stable/c/6cef9e4425143b19742044c8a675335821fa1994nvd
- git.kernel.org/stable/c/9ee5eb3d09217f115f63b7c102d110ccdb1b26afnvd
- git.kernel.org/stable/c/d9457e6258750692c3b27f80880a613178053c25nvd
- git.kernel.org/stable/c/da3cadb8b0f35d845b3e2fbb7d978cf6473fd221nvd
- git.kernel.org/stable/c/dc3a1c6237e7f8046e6d4109bcf1998452ccafadnvd
- git.kernel.org/stable/c/fd017aabd4273216ed4223f17991fc087163771fnvd
News mentions
0No linked articles in our index yet.