HomeDefault status
unaffected
7da2fdaaa1e6062686ac96a9f096c2d7847533e4 (git) before efb028b07f7b2d141b91c2fab5276b601f0d0dbe
affected
7da2fdaaa1e6062686ac96a9f096c2d7847533e4 (git) before 469b0b8ce08818f3e4f01d2fa8d0dadeab501e1f
affected
7da2fdaaa1e6062686ac96a9f096c2d7847533e4 (git) before 26dd44a40096468396b6438985d8e44e0743f64c
affected
Default status
affected
6.17
affected
Any version before 6.17
unaffected
6.17.13 (semver)
unaffected
6.18.2 (semver)
unaffected
6.19-rc1 (original_commit_for_fix)
unaffected
Description
In the Linux kernel, the following vulnerability has been resolved: PM / devfreq: hisi: Fix potential UAF in OPP handling Ensure all required data is acquired before calling dev_pm_opp_put(opp) to maintain correct resource acquisition and release order.
Product status
7da2fdaaa1e6062686ac96a9f096c2d7847533e4 (git) before efb028b07f7b2d141b91c2fab5276b601f0d0dbe
7da2fdaaa1e6062686ac96a9f096c2d7847533e4 (git) before 469b0b8ce08818f3e4f01d2fa8d0dadeab501e1f
7da2fdaaa1e6062686ac96a9f096c2d7847533e4 (git) before 26dd44a40096468396b6438985d8e44e0743f64c
6.17
Any version before 6.17
6.17.13 (semver)
6.18.2 (semver)
6.19-rc1 (original_commit_for_fix)
References
git.kernel.org/...c/efb028b07f7b2d141b91c2fab5276b601f0d0dbe
git.kernel.org/...c/469b0b8ce08818f3e4f01d2fa8d0dadeab501e1f
git.kernel.org/...c/26dd44a40096468396b6438985d8e44e0743f64c
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.