CVE-2025-40346
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is due to an incorrect error check in the Linux kernel function topology_parse_cpu_capacity(). The code incorrectly uses PTR_ERR_OR_ZERO() to check a pointer, which returns 0 for both valid and NULL pointers. This causes the logic to proceed even when the pointer is NULL, leading to a potential NULL pointer dereference when clk_get_rate() is called with a NULL pointer. The fix replaces PTR_ERR_OR_ZERO() with IS_ERR_OR_NULL(), which correctly prevents proceeding with NULL pointers.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to dereference a NULL pointer, which may lead to kernel crashes or system instability. Such crashes can result in denial of service or unexpected behavior in systems running the affected kernel.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by correcting the error check in the Linux kernel's topology_parse_cpu_capacity() function. To mitigate this vulnerability, update your Linux kernel to a version that includes the fix replacing !PTR_ERR_OR_ZERO(cpu_clk) with !IS_ERR_OR_NULL(cpu_clk) in the arch_topology code. This prevents potential NULL pointer dereference in clk_get_rate().