CVE-2025-40161
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's mailbox driver for zynqmp-ipi. The driver incorrectly determines whether an interrupt is an SGI (Software Generated Interrupt) or SPI (Shared Peripheral Interrupt) by checking if the IRQ number is less than 16. This method fails when IRQs are allocated dynamically. As a result, during the unbind process, the driver performs improper SGI cleanup, which can lead to a kernel crash. The fix involves adding an explicit irq_type field to reliably identify SGI interrupts and only clean up SGI resources when appropriate.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash during the unbind process of the mailbox driver due to improper cleanup of SGI interrupts. Such kernel crashes can lead to system instability, potential downtime, and loss of data or service availability.