We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38301

nvmem: zynqmp_nvmem: unbreak driver after cleanup



Description

In the Linux kernel, the following vulnerability has been resolved: nvmem: zynqmp_nvmem: unbreak driver after cleanup Commit 29be47fcd6a0 ("nvmem: zynqmp_nvmem: zynqmp_nvmem_probe cleanup") changed the driver to expect the device pointer to be passed as the "context", but in nvmem the context parameter comes from nvmem_config.priv which is never set - Leading to null pointer exceptions when the device is accessed.

Reserved 2025-04-16 | Published 2025-07-10 | Updated 2025-07-10 | Assigner Linux

Product status

Default status
unaffected

29be47fcd6a06ea2e79eeeca6e69ad1e23254a69 before c8bb1bcea877446f86922a8fd1661b8c07d90e5c
affected

29be47fcd6a06ea2e79eeeca6e69ad1e23254a69 before 3728101f56ef54425a11027a3ddc2c3941d60b71
affected

29be47fcd6a06ea2e79eeeca6e69ad1e23254a69 before fe8abdd175d7b547ae1a612757e7902bcd62e9cf
affected

Default status
affected

6.9
affected

Any version before 6.9
unaffected

6.12.34
unaffected

6.15.3
unaffected

6.16-rc1
unaffected

References

git.kernel.org/...c/c8bb1bcea877446f86922a8fd1661b8c07d90e5c

git.kernel.org/...c/3728101f56ef54425a11027a3ddc2c3941d60b71

git.kernel.org/...c/fe8abdd175d7b547ae1a612757e7902bcd62e9cf

cve.org (CVE-2025-38301)

nvd.nist.gov (CVE-2025-38301)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38301

Support options

Helpdesk Chat, Email, Knowledgebase