Home

Description

In the Linux kernel, the following vulnerability has been resolved: PCI/pwrctrl: Fix double cleanup on devm_add_action_or_reset() failure When devm_add_action_or_reset() fails, it calls the passed cleanup function. Hence the caller must not repeat that cleanup. Replace the "goto err_regulator_free" by the actual freeing, as there will never be a need again for a second user of this label.

PUBLISHED Reserved 2025-04-16 | Published 2025-11-12 | Updated 2025-12-01 | Assigner Linux

Product status

Default status
unaffected

75996c92f4de309f855471927e6489f5a354cfd4 (git) before 77732c58fef6247b71493dc3997af0ec0aaad5c7
affected

75996c92f4de309f855471927e6489f5a354cfd4 (git) before ab81f2f79c683c94bac622aafafbe8232e547159
affected

Default status
affected

6.15
affected

Any version before 6.15
unaffected

6.17.3 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/77732c58fef6247b71493dc3997af0ec0aaad5c7

git.kernel.org/...c/ab81f2f79c683c94bac622aafafbe8232e547159

cve.org (CVE-2025-40145)

nvd.nist.gov (CVE-2025-40145)

Download JSON