CVE-2025-40107
BaseFortify
Publication date: 2025-11-03
Last updated on: 2025-11-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| hi311x | driver | * |
| mcp251x | driver | * |
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's hi311x CAN driver. When the device resumes from sleep, the driver schedules a restart work task. However, if the network interface was not enabled before sleep, the workqueue used for this task is not allocated or initialized, leading to a null pointer dereference. This can cause the system to crash or behave unexpectedly. The fix involved moving the workqueue allocation and initialization earlier in the driver's probe function to ensure it is ready before resume, and adding cleanup logic to prevent resource leaks.
How can this vulnerability impact me? :
This vulnerability can cause a null pointer dereference in the Linux kernel when resuming the hi311x CAN device from sleep if the network interface was not enabled. This can lead to system crashes or instability, potentially causing denial of service or unexpected behavior in systems relying on this driver.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix where the workqueue allocation and initialization in the hi311x driver has been moved from the hi3110_open function to the hi3110_can_probe function. This ensures proper initialization before device resume and prevents null pointer dereference. Additionally, ensure that the kernel includes the added logic to destroy the workqueue in error handling paths and during device removal to prevent resource leaks.