VYPR
Unrated severityNVD Advisory· Published Dec 4, 2025· Updated Apr 15, 2026

CVE-2025-40226

CVE-2025-40226

Description

In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scmi: Account for failed debug initialization

When the SCMI debug subsystem fails to initialize, the related debug root will be missing, and the underlying descriptor will be NULL.

Handle this fault condition in the SCMI debug helpers that maintain metrics counters.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A null-pointer dereference in the Linux kernel's Arm SCMI firmware driver when debug initialization fails.

Vulnerability

Overview

CVE-2025-40226 is a null-pointer dereference vulnerability in the Linux kernel's Arm System Control and Management Interface (SCMI) firmware driver. The root cause is that when the SCMI debug subsystem fails to initialize, the associated debug root descriptor is left as NULL. The SCMI debug helpers that maintain metrics counters do not check for this condition before using the descriptor, leading to a potential crash [1][2].

Exploitation

Exploitation

An attacker would need to trigger a failure in the SCMI debug subsystem initialization, which could occur due to resource exhaustion or a prior error condition. No special privileges are required beyond the ability to interact with the SCMI interface, but the attack surface is limited to systems using the Arm SCMI firmware driver. The vulnerability is triggered when the kernel subsequently attempts to update metrics counters through the debug helpers [1][2].

Impact

Successful exploitation results in a kernel NULL pointer dereference, causing a system crash (denial of service). There is no indication of privilege escalation or data corruption beyond the immediate crash. The crash itself [1][2].

Mitigation

The fix has been applied in the Linux kernel stable tree. Users should update to a kernel version containing the commit that adds a NULL check before accessing the debug root descriptor. No workaround is available other than applying the patch [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.