CVE-2025-40352 (GCVE-0-2025-40352)
Vulnerability from cvelistv5 – Published: 2025-12-16 13:30 – Updated: 2025-12-16 13:30
VLAI?
Title
platform/mellanox: mlxbf-pmc: add sysfs_attr_init() to count_clock init
Summary
In the Linux kernel, the following vulnerability has been resolved:
platform/mellanox: mlxbf-pmc: add sysfs_attr_init() to count_clock init
The lock-related debug logic (CONFIG_LOCK_STAT) in the kernel is noting
the following warning when the BlueField-3 SOC is booted:
BUG: key ffff00008a3402a8 has not been registered!
------------[ cut here ]------------
DEBUG_LOCKS_WARN_ON(1)
WARNING: CPU: 4 PID: 592 at kernel/locking/lockdep.c:4801 lockdep_init_map_type+0x1d4/0x2a0
<snip>
Call trace:
lockdep_init_map_type+0x1d4/0x2a0
__kernfs_create_file+0x84/0x140
sysfs_add_file_mode_ns+0xcc/0x1cc
internal_create_group+0x110/0x3d4
internal_create_groups.part.0+0x54/0xcc
sysfs_create_groups+0x24/0x40
device_add+0x6e8/0x93c
device_register+0x28/0x40
__hwmon_device_register+0x4b0/0x8a0
devm_hwmon_device_register_with_groups+0x7c/0xe0
mlxbf_pmc_probe+0x1e8/0x3e0 [mlxbf_pmc]
platform_probe+0x70/0x110
The mlxbf_pmc driver must call sysfs_attr_init() during the
initialization of the "count_clock" data structure to avoid
this warning.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/platform/mellanox/mlxbf-pmc.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "46be1f5aae82b4136f676528ff091629697c7719",
"status": "affected",
"version": "5efc800975d9a66cf7e7684c07d4c1928f025972",
"versionType": "git"
},
{
"lessThan": "a7b4747d8e0e7871c3d4971cded1dcc9af6af9e9",
"status": "affected",
"version": "5efc800975d9a66cf7e7684c07d4c1928f025972",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/platform/mellanox/mlxbf-pmc.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.14"
},
{
"lessThan": "6.14",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.17.*",
"status": "unaffected",
"version": "6.17.6",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.18",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.17.6",
"versionStartIncluding": "6.14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18",
"versionStartIncluding": "6.14",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/mellanox: mlxbf-pmc: add sysfs_attr_init() to count_clock init\n\nThe lock-related debug logic (CONFIG_LOCK_STAT) in the kernel is noting\nthe following warning when the BlueField-3 SOC is booted:\n\n BUG: key ffff00008a3402a8 has not been registered!\n ------------[ cut here ]------------\n DEBUG_LOCKS_WARN_ON(1)\n WARNING: CPU: 4 PID: 592 at kernel/locking/lockdep.c:4801 lockdep_init_map_type+0x1d4/0x2a0\n\u003csnip\u003e\n Call trace:\n lockdep_init_map_type+0x1d4/0x2a0\n __kernfs_create_file+0x84/0x140\n sysfs_add_file_mode_ns+0xcc/0x1cc\n internal_create_group+0x110/0x3d4\n internal_create_groups.part.0+0x54/0xcc\n sysfs_create_groups+0x24/0x40\n device_add+0x6e8/0x93c\n device_register+0x28/0x40\n __hwmon_device_register+0x4b0/0x8a0\n devm_hwmon_device_register_with_groups+0x7c/0xe0\n mlxbf_pmc_probe+0x1e8/0x3e0 [mlxbf_pmc]\n platform_probe+0x70/0x110\n\nThe mlxbf_pmc driver must call sysfs_attr_init() during the\ninitialization of the \"count_clock\" data structure to avoid\nthis warning."
}
],
"providerMetadata": {
"dateUpdated": "2025-12-16T13:30:25.536Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/46be1f5aae82b4136f676528ff091629697c7719"
},
{
"url": "https://git.kernel.org/stable/c/a7b4747d8e0e7871c3d4971cded1dcc9af6af9e9"
}
],
"title": "platform/mellanox: mlxbf-pmc: add sysfs_attr_init() to count_clock init",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-40352",
"datePublished": "2025-12-16T13:30:25.536Z",
"dateReserved": "2025-04-16T07:20:57.187Z",
"dateUpdated": "2025-12-16T13:30:25.536Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-40352\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-16T14:15:47.083\",\"lastModified\":\"2025-12-18T15:08:25.907\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nplatform/mellanox: mlxbf-pmc: add sysfs_attr_init() to count_clock init\\n\\nThe lock-related debug logic (CONFIG_LOCK_STAT) in the kernel is noting\\nthe following warning when the BlueField-3 SOC is booted:\\n\\n BUG: key ffff00008a3402a8 has not been registered!\\n ------------[ cut here ]------------\\n DEBUG_LOCKS_WARN_ON(1)\\n WARNING: CPU: 4 PID: 592 at kernel/locking/lockdep.c:4801 lockdep_init_map_type+0x1d4/0x2a0\\n\u003csnip\u003e\\n Call trace:\\n lockdep_init_map_type+0x1d4/0x2a0\\n __kernfs_create_file+0x84/0x140\\n sysfs_add_file_mode_ns+0xcc/0x1cc\\n internal_create_group+0x110/0x3d4\\n internal_create_groups.part.0+0x54/0xcc\\n sysfs_create_groups+0x24/0x40\\n device_add+0x6e8/0x93c\\n device_register+0x28/0x40\\n __hwmon_device_register+0x4b0/0x8a0\\n devm_hwmon_device_register_with_groups+0x7c/0xe0\\n mlxbf_pmc_probe+0x1e8/0x3e0 [mlxbf_pmc]\\n platform_probe+0x70/0x110\\n\\nThe mlxbf_pmc driver must call sysfs_attr_init() during the\\ninitialization of the \\\"count_clock\\\" data structure to avoid\\nthis warning.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/46be1f5aae82b4136f676528ff091629697c7719\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a7b4747d8e0e7871c3d4971cded1dcc9af6af9e9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…