-

CVE-2025-40107

In the Linux kernel, the following vulnerability has been resolved:

can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled

This issue is similar to the vulnerability in the `mcp251x` driver,
which was fixed in commit 03c427147b2d ("can: mcp251x: fix resume from
sleep before interface was brought up").

In the `hi311x` driver, when the device resumes from sleep, the driver
schedules `priv->restart_work`. However, if the network interface was
not previously enabled, the `priv->wq` (workqueue) is not allocated and
initialized, leading to a null pointer dereference.

To fix this, we move the allocation and initialization of the workqueue
from the `hi3110_open` function to the `hi3110_can_probe` function.
This ensures that the workqueue is properly initialized before it is
used during device resume. And added logic to destroy the workqueue
in the error handling paths of `hi3110_can_probe` and in the
`hi3110_can_remove` function to prevent resource leaks.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < d1fc4c041459e2d4856c1b2501486ba4f0cbf96b
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < e93af787187e585933570563c643337fa731584a
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 1d2ef21f02baff0c109ad78b9e835fb4acb14533
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < fd00cf38fd437c979f0e5905e3ebdfc3f55a4b96
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 6b696808472197b77b888f50bc789a3bae077743
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version <= 6.1.*
Version 6.1.156
Status unaffected
Version <= 6.6.*
Version 6.6.111
Status unaffected
Version <= 6.12.*
Version 6.12.52
Status unaffected
Version <= 6.16.*
Version 6.16.12
Status unaffected
Version <= *
Version 6.17
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.135
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String