{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T16:13:50.651","vulnerabilities":[{"cve":{"id":"CVE-2025-40032","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-10-28T12:15:37.010","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release\n\nThe fields dma_chan_tx and dma_chan_rx of the struct pci_epf_test can be\nNULL even after EPF initialization. Then it is prudent to check that\nthey have non-NULL values before releasing the channels. Add the checks\nin pci_epf_test_clean_dma_chan().\n\nWithout the checks, NULL pointer dereferences happen and they can lead\nto a kernel panic in some cases:\n\n  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050\n  Call trace:\n   dma_release_channel+0x2c/0x120 (P)\n   pci_epf_test_epc_deinit+0x94/0xc0 [pci_epf_test]\n   pci_epc_deinit_notify+0x74/0xc0\n   tegra_pcie_ep_pex_rst_irq+0x250/0x5d8\n   irq_thread_fn+0x34/0xb8\n   irq_thread+0x18c/0x2e8\n   kthread+0x14c/0x210\n   ret_from_fork+0x10/0x20\n\n[mani: trimmed the stack trace]"}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/0c5ce6b6ccc22d486cc7239ed908cb0ae5363a7b","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/57f7fb0d1ac28540c0f6405c829bb9c3b89d8dba","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/6411f840a9b5c47c00ca8e004733de232553870d","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/85afa9ea122dd9d4a2ead104a951d318975dcd25","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/fb54ffd60064c4e5139a3eb216e877b1acae1c8b","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}