CVE-2025-40193
Description
In the Linux kernel, the following vulnerability has been resolved:
xtensa: simdisk: add input size check in proc_write_simdisk
A malicious user could pass an arbitrarily bad value to memdup_user_nul(), potentially causing kernel crash.
This follows the same pattern as commit ee76746387f6 ("netdevsim: prevent bad user input in nsim_dev_health_break_write()")
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A missing input size check in the Linux kernel's xtensa simdisk driver allows a local attacker to cause a kernel crash.
Vulnerability
Analysis
The vulnerability resides in the proc_write_simdisk function of the Linux kernel's Xtensa architecture-specific simdisk driver. The function previously passed user-supplied data to memdup_user_nul() without first verifying the input size. An arbitrarily large or malformed value could trigger a crash, as the driver didn't validate the length of the data copied from userspace [1][2].
Exploitation
An attacker with local access to the system can exploit this by writing crafted content to the /proc/simdisk procfs entry. No special privileges beyond the ability to write to the proc file are needed, making the prerequisite minimal. The lack of input validation allows the attacker to trigger an out-of-bounds memory access or similar fault.
Impact
Impact
Successful exploitation results in a kernel crash, leading to a denial-of-service (DoS) condition on the affected Xtensa-based systems. The vulnerability does not appear to grant privilege escalation, but it can render the system unavailable.
Mitigation
The fix follows the pattern introduced in commit ee76746387f6 ("netdevsim: prevent bad user input"), adding a size check before copying data. Patched versions are available in the Linux kernel stable branches, as referenced in [1] and [2]. Users should apply the latest kernel updates to mitigate the issue.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
5f40405ccfb87151bd8885947d381de7fd4cda0c2c36d864e5d5f08fd0cd9Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/151bd88859474cdaccc1e4c8b21fbf72dbba2ab4nvd
- git.kernel.org/stable/c/5d5f08fd0cd970184376bee07d59f635c8403f63nvd
- git.kernel.org/stable/c/a0c2c36d864ef3676b05cfd8c58b72ee3214cb1anvd
- git.kernel.org/stable/c/d381de7fd4cdc928ede96987dc64b133e6480dd6nvd
- git.kernel.org/stable/c/f40405ccfb87b71175f2d5d004c0b8a0aebcc2cfnvd
News mentions
0No linked articles in our index yet.