Linux Kernel qaic: Zero-Length DMA XFER Crash (CVE-2025-40172)
CVE-2025-40172 Published on November 12, 2025

accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()
In the Linux kernel, the following vulnerability has been resolved: accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages() Currently, if find_and_map_user_pages() takes a DMA xfer request from the user with a length field set to 0, or in a rare case, the host receives QAIC_TRANS_DMA_XFER_CONT from the device where resources->xferred_dma_size is equal to the requested transaction size, the function will return 0 before allocating an sgt or setting the fields of the dma_xfer struct. In that case, encode_addr_size_pairs() will try to access the sgt which will lead to a general protection fault. Return an EINVAL in case the user provides a zero-sized ALP, or the device requests continuation after all of the bytes have been transferred.

NVD


Products Associated with CVE-2025-40172

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2025-40172 are published in these products:

 
 
 

Affected Versions

Linux: Linux:

Exploit Probability

EPSS
0.03%
Percentile
7.08%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.