{"id":"CVE-2025-40032","summary":"PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release\n\nThe fields dma_chan_tx and dma_chan_rx of the struct pci_epf_test can be\nNULL even after EPF initialization. Then it is prudent to check that\nthey have non-NULL values before releasing the channels. Add the checks\nin pci_epf_test_clean_dma_chan().\n\nWithout the checks, NULL pointer dereferences happen and they can lead\nto a kernel panic in some cases:\n\n  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050\n  Call trace:\n   dma_release_channel+0x2c/0x120 (P)\n   pci_epf_test_epc_deinit+0x94/0xc0 [pci_epf_test]\n   pci_epc_deinit_notify+0x74/0xc0\n   tegra_pcie_ep_pex_rst_irq+0x250/0x5d8\n   irq_thread_fn+0x34/0xb8\n   irq_thread+0x18c/0x2e8\n   kthread+0x14c/0x210\n   ret_from_fork+0x10/0x20\n\n[mani: trimmed the stack trace]","modified":"2026-05-07T04:16:49.981684Z","published":"2025-10-28T11:48:14.876Z","related":["SUSE-SU-2025:21040-1","SUSE-SU-2025:21052-1","SUSE-SU-2025:21056-1","SUSE-SU-2025:21064-1","SUSE-SU-2025:21080-1","SUSE-SU-2025:21147-1","SUSE-SU-2025:21180-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4128-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4140-1","SUSE-SU-2025:4141-1","SUSE-SU-2025:4301-1","openSUSE-SU-2025:15702-1","openSUSE-SU-2025:20091-1","openSUSE-SU-2026:10301-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40032.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0c5ce6b6ccc22d486cc7239ed908cb0ae5363a7b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/57f7fb0d1ac28540c0f6405c829bb9c3b89d8dba"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6411f840a9b5c47c00ca8e004733de232553870d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/85afa9ea122dd9d4a2ead104a951d318975dcd25"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fb54ffd60064c4e5139a3eb216e877b1acae1c8b"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40032.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40032"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"5ebf3fc59bd20d17df3ba26159787d13cf20d362"},{"fixed":"6411f840a9b5c47c00ca8e004733de232553870d"},{"fixed":"0c5ce6b6ccc22d486cc7239ed908cb0ae5363a7b"},{"fixed":"fb54ffd60064c4e5139a3eb216e877b1acae1c8b"},{"fixed":"57f7fb0d1ac28540c0f6405c829bb9c3b89d8dba"},{"fixed":"85afa9ea122dd9d4a2ead104a951d318975dcd25"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40032.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.7.0"},{"fixed":"6.1.157"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.113"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.54"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40032.json"}}],"schema_version":"1.7.5"}