CVE-2025-40181
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves how the Linux kernel handles memory mapping for legacy PCI devices when running as an SNP or TDX guest under KVM virtualization. Specifically, the kernel did not properly force the legacy PCI hole memory region to be mapped as uncacheable (UC) when overriding memory type range registers (MTRRs). Because the ACPI specification does not specify memory types for SystemMemory regions, the Linux ACPI driver maps these regions as write-back (WB) cacheable by default, which conflicts with device drivers that require uncacheable (UC) or write-combining (WC) mappings. This mismatch can cause device driver initialization failures, such as the TPM driver failing to map its memory region, leading to errors and potential device malfunction in virtualized environments.
How can this vulnerability impact me? :
This vulnerability can cause device drivers for legacy PCI devices (like TPM or HPET) to fail during initialization in SNP or TDX guest virtual machines running under KVM. The failure occurs because the memory region mapping conflicts between the ACPI driver (which maps as write-back) and the device drivers (which require uncacheable or write-combining mappings). This can lead to devices not functioning correctly or being inaccessible, potentially impacting system stability, security features relying on TPM, or other hardware-dependent operations within the virtualized environment.