CVE-2025-40317
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| snd_soc_wcd934x | wcd934x | * |
| linux | linux_kernel | * |
| snd_pcm | snd_pcm | * |
| snd_soc_core | snd_soc_core | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel's regmap initialization for the slimbus bus. A recent commit introduced the use of __devm_regmap_init_slimbus() instead of __regmap_init_slimbus(), but the bus_context pointer argument passed was incorrect. This incorrect pointer caused kernel paging faults, leading to crashes such as audio playback failures on devices like the Thundercomm Dragonboard 845c. The fix involves correcting the bus_context pointer to the proper value ("slimbus"), ensuring stable operation of the regmap initialization on the slimbus bus.
How can this vulnerability impact me? :
This vulnerability can cause kernel crashes due to invalid memory access when using the slimbus regmap, which can disrupt audio playback and potentially other functionalities relying on this bus. For example, on affected hardware like the Thundercomm Dragonboard 845c, audio playback may fail, leading to system instability or degraded user experience.
What immediate steps should I take to mitigate this vulnerability?
Update the Linux kernel to a version that includes the fix for the regmap slimbus bus_context pointer issue. The fix involves correcting the bus_context pointer argument in __devm_regmap_init_slimbus() and __regmap_init_slimbus() functions to use the correct slimbus device pointer. This will prevent kernel paging faults and audio playback errors on affected hardware such as the Thundercomm Dragonboard 845c.