VYPR
Unrated severityNVD Advisory· Published Nov 12, 2025· Updated Apr 15, 2026

CVE-2025-40193

CVE-2025-40193

Description

In the Linux kernel, the following vulnerability has been resolved:

xtensa: simdisk: add input size check in proc_write_simdisk

A malicious user could pass an arbitrarily bad value to memdup_user_nul(), potentially causing kernel crash.

This follows the same pattern as commit ee76746387f6 ("netdevsim: prevent bad user input in nsim_dev_health_break_write()")

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing input size check in the Linux kernel's xtensa simdisk driver allows a local attacker to cause a kernel crash.

Vulnerability

Analysis

The vulnerability resides in the proc_write_simdisk function of the Linux kernel's Xtensa architecture-specific simdisk driver. The function previously passed user-supplied data to memdup_user_nul() without first verifying the input size. An arbitrarily large or malformed value could trigger a crash, as the driver didn't validate the length of the data copied from userspace [1][2].

Exploitation

An attacker with local access to the system can exploit this by writing crafted content to the /proc/simdisk procfs entry. No special privileges beyond the ability to write to the proc file are needed, making the prerequisite minimal. The lack of input validation allows the attacker to trigger an out-of-bounds memory access or similar fault.

Impact

Impact

Successful exploitation results in a kernel crash, leading to a denial-of-service (DoS) condition on the affected Xtensa-based systems. The vulnerability does not appear to grant privilege escalation, but it can render the system unavailable.

Mitigation

The fix follows the pattern introduced in commit ee76746387f6 ("netdevsim: prevent bad user input"), adding a size check before copying data. Patched versions are available in the Linux kernel stable branches, as referenced in [1] and [2]. Users should apply the latest kernel updates to mitigate the issue.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

5

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.