VYPR
Unrated severityNVD Advisory· Published Dec 4, 2025· Updated Apr 15, 2026

CVE-2025-40234

CVE-2025-40234

Description

In the Linux kernel, the following vulnerability has been resolved:

platform/x86: alienware-wmi-wmax: Fix NULL pointer dereference in sleep handlers

Devices without the AWCC interface don't initialize awcc. Add a check before dereferencing it in sleep handlers.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A NULL pointer dereference in alienware-wmi-wmax driver sleep handlers can crash the kernel on systems without AWCC interface.

Vulnerability

Overview

In the Linux kernel, the alienware-wmi-wmax driver for Alienware WMI hardware contains a NULL pointer dereference vulnerability in its sleep handlers (suspend/resume). The root cause is that devices lacking the AWCC (Alienware Command Center) interface do not initialize the awcc structure pointer. When the system enters or resumes from sleep, the driver attempts to dereference this uninitialized pointer, leading to a kernel crash [1].

Exploitation

Prerequisites

An attacker would need to have local access to a system running a vulnerable kernel version and must be able to trigger a suspend/resume cycle. No special privileges beyond the ability to initiate system sleep are required. The vulnerability is present in the driver's sleep callbacks, which are invoked during power management transitions [1].

Impact

Successful exploitation results in a denial of service (DoS) via kernel panic or crash. The NULL pointer dereference causes an immediate oops, unrecoverable system halt, requiring a reboot. There is no indication of privilege escalation or data corruption beyond the crash itself [1].

Mitigation

The fix has been applied in the Linux kernel stable tree via commit a49c4d48c3b6. Users should update to a kernel version containing this patch. No workaround is available other than avoiding suspend/resume on affected hardware or unloading the alienware-wmi-wmax module if not needed [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

2

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

2

News mentions

0

No linked articles in our index yet.