Description
In the Linux kernel, the following vulnerability has been resolved: arch_topology: Fix incorrect error check in topology_parse_cpu_capacity() Fix incorrect use of PTR_ERR_OR_ZERO() in topology_parse_cpu_capacity() which causes the code to proceed with NULL clock pointers. The current logic uses !PTR_ERR_OR_ZERO(cpu_clk) which evaluates to true for both valid pointers and NULL, leading to potential NULL pointer dereference in clk_get_rate(). Per include/linux/err.h documentation, PTR_ERR_OR_ZERO(ptr) returns: "The error code within @ptr if it is an error pointer; 0 otherwise." This means PTR_ERR_OR_ZERO() returns 0 for both valid pointers AND NULL pointers. Therefore !PTR_ERR_OR_ZERO(cpu_clk) evaluates to true (proceed) when cpu_clk is either valid or NULL, causing clk_get_rate(NULL) to be called when of_clk_get() returns NULL. Replace with !IS_ERR_OR_NULL(cpu_clk) which only proceeds for valid pointers, preventing potential NULL pointer dereference in clk_get_rate().
Product status
b8fe128dad8f97cc9af7c55a264d1fc5ab677195 (git) before 64da320252e43456cc9ec3055ff567f168467b37
b8fe128dad8f97cc9af7c55a264d1fc5ab677195 (git) before 02fbea0864fd4a863671f5d418129258d7159f68
b8fe128dad8f97cc9af7c55a264d1fc5ab677195 (git) before a77f8434954cb1e9c42c3854e40855fdcf5ab235
b8fe128dad8f97cc9af7c55a264d1fc5ab677195 (git) before 3373f263bb647fcc3b5237cfaef757633b9ee25e
b8fe128dad8f97cc9af7c55a264d1fc5ab677195 (git) before 45379303124487db3a81219af7565d41f498167f
b8fe128dad8f97cc9af7c55a264d1fc5ab677195 (git) before 3a01b2614e84361aa222f67bc628593987e5cdb2
b8fe128dad8f97cc9af7c55a264d1fc5ab677195 (git) before 2eead19334516c8e9927c11b448fbe512b1f18a1
5.7
Any version before 5.7
5.10.246 (semver)
5.15.196 (semver)
6.1.158 (semver)
6.6.115 (semver)
6.12.56 (semver)
6.17.6 (semver)
6.18 (original_commit_for_fix)
References
git.kernel.org/...c/64da320252e43456cc9ec3055ff567f168467b37
git.kernel.org/...c/02fbea0864fd4a863671f5d418129258d7159f68
git.kernel.org/...c/a77f8434954cb1e9c42c3854e40855fdcf5ab235
git.kernel.org/...c/3373f263bb647fcc3b5237cfaef757633b9ee25e
git.kernel.org/...c/45379303124487db3a81219af7565d41f498167f
git.kernel.org/...c/3a01b2614e84361aa222f67bc628593987e5cdb2
git.kernel.org/...c/2eead19334516c8e9927c11b448fbe512b1f18a1
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.