CVE-2025-40073
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.15.0-rc2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's drm/msm component where the code attempts to validate a Shared Source Pixel Processor (SSPP) for a current plane that is not yet associated with any SSPP. This leads to a null pointer dereference because the current plane's SSPP is null, causing the kernel to crash or behave unexpectedly. The fix involves skipping SSPP validation for the current plane when it is not ready, preventing the null pointer dereference.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a null pointer dereference, leading to system instability or denial of service. It affects the drm/msm driver handling display planes, potentially impacting devices using this driver by causing unexpected kernel errors or crashes when handling multi-rect mode display planes.