-

CVE-2025-40194

In the Linux kernel, the following vulnerability has been resolved:

cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()

The cpufreq_cpu_put() call in update_qos_request() takes place too early
because the latter subsequently calls freq_qos_update_request() that
indirectly accesses the policy object in question through the QoS request
object passed to it.

Fortunately, update_qos_request() is called under intel_pstate_driver_lock,
so this issue does not matter for changing the intel_pstate operation
mode, but it theoretically can cause a crash to occur on CPU device hot
removal (which currently can only happen in virt, but it is formally
supported nevertheless).

Address this issue by modifying update_qos_request() to drop the
reference to the policy later.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 15ac9579ebdaf22a37d7f60b3a8efc1029732ef9
Version da5c504c7aae96db68c4b38e2564a88e91842d89
Status affected
Version < bc26564bcc659beb6d977cd6eb394041ec2f2851
Version da5c504c7aae96db68c4b38e2564a88e91842d89
Status affected
Version < ad4e8f9bdbef11a19b7cb93e7f313bf59bdcc3b4
Version da5c504c7aae96db68c4b38e2564a88e91842d89
Status affected
Version < 0a58d3e77b22b087a57831c87cafd360e144a5bd
Version da5c504c7aae96db68c4b38e2564a88e91842d89
Status affected
Version < 69a18ff6c60e8e113420f15355fad862cb45d38e
Version da5c504c7aae96db68c4b38e2564a88e91842d89
Status affected
Version < ba63d4e9857a72a89e71a4eff9f2cc8c283e94c3
Version da5c504c7aae96db68c4b38e2564a88e91842d89
Status affected
Version < 57e4a6aadf12578b96a038373cffd54b3a58b092
Version da5c504c7aae96db68c4b38e2564a88e91842d89
Status affected
Version < 69e5d50fcf4093fb3f9f41c4f931f12c2ca8c467
Version da5c504c7aae96db68c4b38e2564a88e91842d89
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.4
Status affected
Version < 5.4
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.301
Status unaffected
Version <= 5.10.*
Version 5.10.246
Status unaffected
Version <= 5.15.*
Version 5.15.195
Status unaffected
Version <= 6.1.*
Version 6.1.157
Status unaffected
Version <= 6.6.*
Version 6.6.113
Status unaffected
Version <= 6.12.*
Version 6.12.54
Status unaffected
Version <= 6.17.*
Version 6.17.4
Status unaffected
Version <= *
Version 6.18
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.193
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String