CVE-2025-40034
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the Linux kernel's PCI/AER subsystem, specifically in the aer_ratelimit() function. When platform firmware provides error information via ACPI APEI GHES, it may reference a device that does not advertise an AER Capability, causing dev->aer_info to be NULL. While pci_dev_aer_stats_incr() checks for this NULL, aer_ratelimit() did not, leading to a NULL pointer dereference and potential kernel crash. The fix adds a NULL check in aer_ratelimit() to prevent this issue.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a NULL pointer dereference when handling hardware error reports from certain devices. This can lead to system instability or downtime, especially on systems using affected hardware and firmware error reporting mechanisms.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for NULL pointer dereference errors related to aer_ratelimit() and PCI/AER hardware error messages from the ACPI APEI GHES mechanism. Look for messages similar to: "BUG: kernel NULL pointer dereference, address: ... RIP: ... ratelimit" and hardware error logs indicating devices that do not advertise AER Capability but generate error reports. Commands to check kernel logs include: `dmesg | grep -i aer`, `journalctl -k | grep -i aer`, or `dmesg | grep -i 'NULL pointer dereference'`.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the NULL pointer check in aer_ratelimit() has been added, as this patch prevents the NULL pointer dereference. Until the update is applied, monitoring and possibly disabling problematic PCI devices that do not advertise AER Capability but generate errors may reduce crashes. Additionally, ensure platform firmware is up to date to minimize erroneous error reports.