-

CVE-2025-71111

In the Linux kernel, the following vulnerability has been resolved:

hwmon: (w83791d) Convert macros to functions to avoid TOCTOU

The macro FAN_FROM_REG evaluates its arguments multiple times. When used
in lockless contexts involving shared driver data, this leads to
Time-of-Check to Time-of-Use (TOCTOU) race conditions, potentially
causing divide-by-zero errors.

Convert the macro to a static function. This guarantees that arguments
are evaluated only once (pass-by-value), preventing the race
conditions.

Additionally, in store_fan_div, move the calculation of the minimum
limit inside the update lock. This ensures that the read-modify-write
sequence operates on consistent data.

Adhere to the principle of minimal changes by only converting macros
that evaluate arguments multiple times and are used in lockless
contexts.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 3dceb68f6ad33156032ef4da21a93d84059cca6d
Version 9873964d6eb24bd0205394f9b791de9eddbcb855
Status affected
Version < bf5b03227f2e6d4360004886d268f9df8993ef8f
Version 9873964d6eb24bd0205394f9b791de9eddbcb855
Status affected
Version < f2b579a0c37c0df19603d719894a942a295f634a
Version 9873964d6eb24bd0205394f9b791de9eddbcb855
Status affected
Version < f94800fbc26ccf7c81eb791707b038a57aa39a18
Version 9873964d6eb24bd0205394f9b791de9eddbcb855
Status affected
Version < a9fb6e8835a22f5796c1182ed612daed3fd273af
Version 9873964d6eb24bd0205394f9b791de9eddbcb855
Status affected
Version < c8cf0c2bdcccc6634b6915ff793b844e12436680
Version 9873964d6eb24bd0205394f9b791de9eddbcb855
Status affected
Version < 670d7ef945d3a84683594429aea6ab2cdfa5ceb4
Version 9873964d6eb24bd0205394f9b791de9eddbcb855
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.18
Status affected
Version < 2.6.18
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.248
Status unaffected
Version <= 5.15.*
Version 5.15.198
Status unaffected
Version <= 6.1.*
Version 6.1.160
Status unaffected
Version <= 6.6.*
Version 6.6.120
Status unaffected
Version <= 6.12.*
Version 6.12.64
Status unaffected
Version <= 6.18.*
Version 6.18.3
Status unaffected
Version <= *
Version 6.19-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.088
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.