Home

Description

In the Linux kernel, the following vulnerability has been resolved: arch_topology: Fix incorrect error check in topology_parse_cpu_capacity() Fix incorrect use of PTR_ERR_OR_ZERO() in topology_parse_cpu_capacity() which causes the code to proceed with NULL clock pointers. The current logic uses !PTR_ERR_OR_ZERO(cpu_clk) which evaluates to true for both valid pointers and NULL, leading to potential NULL pointer dereference in clk_get_rate(). Per include/linux/err.h documentation, PTR_ERR_OR_ZERO(ptr) returns: "The error code within @ptr if it is an error pointer; 0 otherwise." This means PTR_ERR_OR_ZERO() returns 0 for both valid pointers AND NULL pointers. Therefore !PTR_ERR_OR_ZERO(cpu_clk) evaluates to true (proceed) when cpu_clk is either valid or NULL, causing clk_get_rate(NULL) to be called when of_clk_get() returns NULL. Replace with !IS_ERR_OR_NULL(cpu_clk) which only proceeds for valid pointers, preventing potential NULL pointer dereference in clk_get_rate().

PUBLISHED Reserved 2025-04-16 | Published 2025-12-16 | Updated 2025-12-16 | Assigner Linux

Product status

Default status
unaffected

b8fe128dad8f97cc9af7c55a264d1fc5ab677195 (git) before 64da320252e43456cc9ec3055ff567f168467b37
affected

b8fe128dad8f97cc9af7c55a264d1fc5ab677195 (git) before 02fbea0864fd4a863671f5d418129258d7159f68
affected

b8fe128dad8f97cc9af7c55a264d1fc5ab677195 (git) before a77f8434954cb1e9c42c3854e40855fdcf5ab235
affected

b8fe128dad8f97cc9af7c55a264d1fc5ab677195 (git) before 3373f263bb647fcc3b5237cfaef757633b9ee25e
affected

b8fe128dad8f97cc9af7c55a264d1fc5ab677195 (git) before 45379303124487db3a81219af7565d41f498167f
affected

b8fe128dad8f97cc9af7c55a264d1fc5ab677195 (git) before 3a01b2614e84361aa222f67bc628593987e5cdb2
affected

b8fe128dad8f97cc9af7c55a264d1fc5ab677195 (git) before 2eead19334516c8e9927c11b448fbe512b1f18a1
affected

Default status
affected

5.7
affected

Any version before 5.7
unaffected

5.10.246 (semver)
unaffected

5.15.196 (semver)
unaffected

6.1.158 (semver)
unaffected

6.6.115 (semver)
unaffected

6.12.56 (semver)
unaffected

6.17.6 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/64da320252e43456cc9ec3055ff567f168467b37

git.kernel.org/...c/02fbea0864fd4a863671f5d418129258d7159f68

git.kernel.org/...c/a77f8434954cb1e9c42c3854e40855fdcf5ab235

git.kernel.org/...c/3373f263bb647fcc3b5237cfaef757633b9ee25e

git.kernel.org/...c/45379303124487db3a81219af7565d41f498167f

git.kernel.org/...c/3a01b2614e84361aa222f67bc628593987e5cdb2

git.kernel.org/...c/2eead19334516c8e9927c11b448fbe512b1f18a1

cve.org (CVE-2025-40346)

nvd.nist.gov (CVE-2025-40346)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.