-

CVE-2025-40030

In the Linux kernel, the following vulnerability has been resolved:

pinctrl: check the return value of pinmux_ops::get_function_name()

While the API contract in docs doesn't specify it explicitly, the
generic implementation of the get_function_name() callback from struct
pinmux_ops - pinmux_generic_get_function_name() - can fail and return
NULL. This is already checked in pinmux_check_ops() so add a similar
check in pinmux_func_name_to_selector() instead of passing the returned
pointer right down to strcmp() where the NULL can get dereferenced. This
is normal operation when adding new pinfunctions.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 1a7fc8fed2bb2e113604fde7a45432ace2056b97
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < e7265dc4c670b89611bcf5fe33acf99bc0aa294f
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < d77ef2f621cd1d605372c4c6ce667c496f6990c3
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < ba7f7c2b2b3261e7def67018c38c69b626e0e66e
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 1a2ea887a5cd7d47bab599f733d89444df018b1a
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 688c688e0bf55824f4a38f8c2180046f089a3e3b
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < b7e0535060a60cc99eafc19cc665d979714cd73a
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 4002ee98c022d671ecc1e4a84029e9ae7d8a5603
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version <= 5.4.*
Version 5.4.301
Status unaffected
Version <= 5.10.*
Version 5.10.246
Status unaffected
Version <= 5.15.*
Version 5.15.195
Status unaffected
Version <= 6.1.*
Version 6.1.156
Status unaffected
Version <= 6.6.*
Version 6.6.112
Status unaffected
Version <= 6.12.*
Version 6.12.53
Status unaffected
Version <= 6.17.*
Version 6.17.3
Status unaffected
Version <= *
Version 6.18
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.188
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String