Количество 15
Количество 15
GHSA-jq6c-xqjw-rcrp
In the Linux kernel, the following vulnerability has been resolved: pinctrl: check the return value of pinmux_ops::get_function_name() While the API contract in docs doesn't specify it explicitly, the generic implementation of the get_function_name() callback from struct pinmux_ops - pinmux_generic_get_function_name() - can fail and return NULL. This is already checked in pinmux_check_ops() so add a similar check in pinmux_func_name_to_selector() instead of passing the returned pointer right down to strcmp() where the NULL can get dereferenced. This is normal operation when adding new pinfunctions.
CVE-2025-40030
In the Linux kernel, the following vulnerability has been resolved: pinctrl: check the return value of pinmux_ops::get_function_name() While the API contract in docs doesn't specify it explicitly, the generic implementation of the get_function_name() callback from struct pinmux_ops - pinmux_generic_get_function_name() - can fail and return NULL. This is already checked in pinmux_check_ops() so add a similar check in pinmux_func_name_to_selector() instead of passing the returned pointer right down to strcmp() where the NULL can get dereferenced. This is normal operation when adding new pinfunctions.
CVE-2025-40030
In the Linux kernel, the following vulnerability has been resolved: pinctrl: check the return value of pinmux_ops::get_function_name() While the API contract in docs doesn't specify it explicitly, the generic implementation of the get_function_name() callback from struct pinmux_ops - pinmux_generic_get_function_name() - can fail and return NULL. This is already checked in pinmux_check_ops() so add a similar check in pinmux_func_name_to_selector() instead of passing the returned pointer right down to strcmp() where the NULL can get dereferenced. This is normal operation when adding new pinfunctions.
CVE-2025-40030
pinctrl: check the return value of pinmux_ops::get_function_name()
CVE-2025-40030
In the Linux kernel, the following vulnerability has been resolved: p ...
SUSE-SU-2025:4515-1
Security update for the Linux Kernel
ELSA-2025-28040
ELSA-2025-28040: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2025:4521-1
Security update for the Linux Kernel
SUSE-SU-2025:4505-1
Security update for the Linux Kernel
SUSE-SU-2025:4422-1
Security update for the Linux Kernel
ELSA-2025-28049
ELSA-2025-28049: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2025:4516-1
Security update for the Linux Kernel
SUSE-SU-2025:4393-1
Security update for the Linux Kernel
SUSE-SU-2025:4517-1
Security update for the Linux Kernel
ELSA-2025-28048
ELSA-2025-28048: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-jq6c-xqjw-rcrp In the Linux kernel, the following vulnerability has been resolved: pinctrl: check the return value of pinmux_ops::get_function_name() While the API contract in docs doesn't specify it explicitly, the generic implementation of the get_function_name() callback from struct pinmux_ops - pinmux_generic_get_function_name() - can fail and return NULL. This is already checked in pinmux_check_ops() so add a similar check in pinmux_func_name_to_selector() instead of passing the returned pointer right down to strcmp() where the NULL can get dereferenced. This is normal operation when adding new pinfunctions. | 0% Низкий | 3 месяца назад | ||
CVE-2025-40030 In the Linux kernel, the following vulnerability has been resolved: pinctrl: check the return value of pinmux_ops::get_function_name() While the API contract in docs doesn't specify it explicitly, the generic implementation of the get_function_name() callback from struct pinmux_ops - pinmux_generic_get_function_name() - can fail and return NULL. This is already checked in pinmux_check_ops() so add a similar check in pinmux_func_name_to_selector() instead of passing the returned pointer right down to strcmp() where the NULL can get dereferenced. This is normal operation when adding new pinfunctions. | 0% Низкий | 3 месяца назад | ||
CVE-2025-40030 In the Linux kernel, the following vulnerability has been resolved: pinctrl: check the return value of pinmux_ops::get_function_name() While the API contract in docs doesn't specify it explicitly, the generic implementation of the get_function_name() callback from struct pinmux_ops - pinmux_generic_get_function_name() - can fail and return NULL. This is already checked in pinmux_check_ops() so add a similar check in pinmux_func_name_to_selector() instead of passing the returned pointer right down to strcmp() where the NULL can get dereferenced. This is normal operation when adding new pinfunctions. | 0% Низкий | 3 месяца назад | ||
CVE-2025-40030 pinctrl: check the return value of pinmux_ops::get_function_name() | CVSS3: 5.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-40030 In the Linux kernel, the following vulnerability has been resolved: p ... | 0% Низкий | 3 месяца назад | ||
SUSE-SU-2025:4515-1 Security update for the Linux Kernel | около 1 месяца назад | |||
ELSA-2025-28040 ELSA-2025-28040: Unbreakable Enterprise kernel security update (IMPORTANT) | около 2 месяцев назад | |||
SUSE-SU-2025:4521-1 Security update for the Linux Kernel | около 1 месяца назад | |||
SUSE-SU-2025:4505-1 Security update for the Linux Kernel | около 1 месяца назад | |||
SUSE-SU-2025:4422-1 Security update for the Linux Kernel | около 2 месяцев назад | |||
ELSA-2025-28049 ELSA-2025-28049: Unbreakable Enterprise kernel security update (IMPORTANT) | около 2 месяцев назад | |||
SUSE-SU-2025:4516-1 Security update for the Linux Kernel | около 1 месяца назад | |||
SUSE-SU-2025:4393-1 Security update for the Linux Kernel | около 2 месяцев назад | |||
SUSE-SU-2025:4517-1 Security update for the Linux Kernel | около 1 месяца назад | |||
ELSA-2025-28048 ELSA-2025-28048: Unbreakable Enterprise kernel security update (IMPORTANT) | около 2 месяцев назад |
Уязвимостей на страницу