HomeDefectsLIN1024-13252
Acknowledged

LIN1024-13252 : Security Advisory - linux - CVE-2025-40172

Created: Nov 12, 2025    Updated: Nov 25, 2025
Found In Version: 10.24.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 24
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:[EOL][EOL]accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()[EOL][EOL]Currently, if find_and_map_user_pages() takes a DMA xfer request from the[EOL]user with a length field set to 0, or in a rare case, the host receives[EOL]QAIC_TRANS_DMA_XFER_CONT from the device where resources->xferred_dma_size[EOL]is equal to the requested transaction size, the function will return 0[EOL]before allocating an sgt or setting the fields of the dma_xfer struct.[EOL]In that case, encode_addr_size_pairs() will try to access the sgt which[EOL]will lead to a general protection fault.[EOL][EOL]Return an EINVAL in case the user provides a zero-sized ALP, or the device[EOL]requests continuation after all of the bytes have been transferred.
Live chat
Online