{"id":"CVE-2025-40188","summary":"pwm: berlin: Fix wrong register in suspend/resume","details":"In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe 'enable' register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.","modified":"2026-04-02T12:48:19.116675Z","published":"2025-11-12T21:56:30.108Z","related":["SUSE-SU-2025:4393-1","SUSE-SU-2025:4422-1","SUSE-SU-2025:4505-1","SUSE-SU-2025:4516-1","SUSE-SU-2025:4517-1","SUSE-SU-2025:4521-1","SUSE-SU-2026:20012-1","SUSE-SU-2026:20015-1","SUSE-SU-2026:20021-1","SUSE-SU-2026:20039-1","SUSE-SU-2026:20059-1","SUSE-SU-2026:20473-1","SUSE-SU-2026:20496-1","openSUSE-SU-2025:20172-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40188.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3a4b9d027e4061766f618292df91760ea64a1fcc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5419c86ea134b8a5b8126f55fa5bc1ad7b3ca444"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6cef9e4425143b19742044c8a675335821fa1994"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9ee5eb3d09217f115f63b7c102d110ccdb1b26af"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d9457e6258750692c3b27f80880a613178053c25"},{"type":"WEB","url":"https://git.kernel.org/stable/c/da3cadb8b0f35d845b3e2fbb7d978cf6473fd221"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dc3a1c6237e7f8046e6d4109bcf1998452ccafad"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fd017aabd4273216ed4223f17991fc087163771f"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40188.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40188"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"bbf0722c1c663b08f612bd8c58af27f45aa84862"},{"fixed":"da3cadb8b0f35d845b3e2fbb7d978cf6473fd221"},{"fixed":"5419c86ea134b8a5b8126f55fa5bc1ad7b3ca444"},{"fixed":"9ee5eb3d09217f115f63b7c102d110ccdb1b26af"},{"fixed":"fd017aabd4273216ed4223f17991fc087163771f"},{"fixed":"dc3a1c6237e7f8046e6d4109bcf1998452ccafad"},{"fixed":"d9457e6258750692c3b27f80880a613178053c25"},{"fixed":"6cef9e4425143b19742044c8a675335821fa1994"},{"fixed":"3a4b9d027e4061766f618292df91760ea64a1fcc"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-40188.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.9.0"},{"fixed":"5.4.301"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.246"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.195"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.157"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.113"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.54"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-40188.json"}}],"schema_version":"1.7.5"}