CVE-2025-40172
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
12/11/2025
Última modificación:
12/11/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()<br />
<br />
Currently, if find_and_map_user_pages() takes a DMA xfer request from the<br />
user with a length field set to 0, or in a rare case, the host receives<br />
QAIC_TRANS_DMA_XFER_CONT from the device where resources->xferred_dma_size<br />
is equal to the requested transaction size, the function will return 0<br />
before allocating an sgt or setting the fields of the dma_xfer struct.<br />
In that case, encode_addr_size_pairs() will try to access the sgt which<br />
will lead to a general protection fault.<br />
<br />
Return an EINVAL in case the user provides a zero-sized ALP, or the device<br />
requests continuation after all of the bytes have been transferred.



