-

CVE-2025-40030

In the Linux kernel, the following vulnerability has been resolved:

pinctrl: check the return value of pinmux_ops::get_function_name()

While the API contract in docs doesn't specify it explicitly, the
generic implementation of the get_function_name() callback from struct
pinmux_ops - pinmux_generic_get_function_name() - can fail and return
NULL. This is already checked in pinmux_check_ops() so add a similar
check in pinmux_func_name_to_selector() instead of passing the returned
pointer right down to strcmp() where the NULL can get dereferenced. This
is normal operation when adding new pinfunctions.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 1a7fc8fed2bb2e113604fde7a45432ace2056b97
Version f913cfce4ee49a3382a9ff95696f49a46e56e974
Status affected
Version < e7265dc4c670b89611bcf5fe33acf99bc0aa294f
Version f913cfce4ee49a3382a9ff95696f49a46e56e974
Status affected
Version < d77ef2f621cd1d605372c4c6ce667c496f6990c3
Version f913cfce4ee49a3382a9ff95696f49a46e56e974
Status affected
Version < ba7f7c2b2b3261e7def67018c38c69b626e0e66e
Version f913cfce4ee49a3382a9ff95696f49a46e56e974
Status affected
Version < 1a2ea887a5cd7d47bab599f733d89444df018b1a
Version f913cfce4ee49a3382a9ff95696f49a46e56e974
Status affected
Version < 688c688e0bf55824f4a38f8c2180046f089a3e3b
Version f913cfce4ee49a3382a9ff95696f49a46e56e974
Status affected
Version < b7e0535060a60cc99eafc19cc665d979714cd73a
Version f913cfce4ee49a3382a9ff95696f49a46e56e974
Status affected
Version < 4002ee98c022d671ecc1e4a84029e9ae7d8a5603
Version f913cfce4ee49a3382a9ff95696f49a46e56e974
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.19
Status affected
Version < 4.19
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.301
Status unaffected
Version <= 5.10.*
Version 5.10.246
Status unaffected
Version <= 5.15.*
Version 5.15.195
Status unaffected
Version <= 6.1.*
Version 6.1.156
Status unaffected
Version <= 6.6.*
Version 6.6.112
Status unaffected
Version <= 6.12.*
Version 6.12.53
Status unaffected
Version <= 6.17.*
Version 6.17.3
Status unaffected
Version <= *
Version 6.18
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.166
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.