Описание
In the Linux kernel, the following vulnerability has been resolved:
PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()
The drv->sram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which would lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check that the pointer is valid.
In the Linux kernel, the following vulnerability has been resolved:
PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()
The drv->sram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which would lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check that the pointer is valid.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-40156
- https://git.kernel.org/stable/c/24d61b6e23d2c7291c528dd43a0bf76b5c05c8f0
- https://git.kernel.org/stable/c/44e32104cf7e670e3d683c97b52350d8fac23322
- https://git.kernel.org/stable/c/80eab6a9df7e1107dc334434dbacd05297703377
- https://git.kernel.org/stable/c/9cc23e221f392304b7b8aad213812564ddf6517e
- https://git.kernel.org/stable/c/fc33bf0e097c6834646b98a7b3da0ae5b617f0f9
EPSS
CVE ID
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe() The drv->sram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which would lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check that the pointer is valid.
In the Linux kernel, the following vulnerability has been resolved: PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe() The drv->sram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which would lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check that the pointer is valid.
In the Linux kernel, the following vulnerability has been resolved: P ...
Уязвимость функции probe() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
EPSS