๐Ÿ” CVE Alert

CVE-2025-40346

UNKNOWN 0.0

arch_topology: Fix incorrect error check in topology_parse_cpu_capacity()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: arch_topology: Fix incorrect error check in topology_parse_cpu_capacity() Fix incorrect use of PTR_ERR_OR_ZERO() in topology_parse_cpu_capacity() which causes the code to proceed with NULL clock pointers. The current logic uses !PTR_ERR_OR_ZERO(cpu_clk) which evaluates to true for both valid pointers and NULL, leading to potential NULL pointer dereference in clk_get_rate(). Per include/linux/err.h documentation, PTR_ERR_OR_ZERO(ptr) returns: "The error code within @ptr if it is an error pointer; 0 otherwise." This means PTR_ERR_OR_ZERO() returns 0 for both valid pointers AND NULL pointers. Therefore !PTR_ERR_OR_ZERO(cpu_clk) evaluates to true (proceed) when cpu_clk is either valid or NULL, causing clk_get_rate(NULL) to be called when of_clk_get() returns NULL. Replace with !IS_ERR_OR_NULL(cpu_clk) which only proceeds for valid pointers, preventing potential NULL pointer dereference in clk_get_rate().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 16, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
b8fe128dad8f97cc9af7c55a264d1fc5ab677195 < 64da320252e43456cc9ec3055ff567f168467b37 b8fe128dad8f97cc9af7c55a264d1fc5ab677195 < 02fbea0864fd4a863671f5d418129258d7159f68 b8fe128dad8f97cc9af7c55a264d1fc5ab677195 < a77f8434954cb1e9c42c3854e40855fdcf5ab235 b8fe128dad8f97cc9af7c55a264d1fc5ab677195 < 3373f263bb647fcc3b5237cfaef757633b9ee25e b8fe128dad8f97cc9af7c55a264d1fc5ab677195 < 45379303124487db3a81219af7565d41f498167f b8fe128dad8f97cc9af7c55a264d1fc5ab677195 < 3a01b2614e84361aa222f67bc628593987e5cdb2 b8fe128dad8f97cc9af7c55a264d1fc5ab677195 < 2eead19334516c8e9927c11b448fbe512b1f18a1
Linux / Linux
5.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/64da320252e43456cc9ec3055ff567f168467b37 git.kernel.org: https://git.kernel.org/stable/c/02fbea0864fd4a863671f5d418129258d7159f68 git.kernel.org: https://git.kernel.org/stable/c/a77f8434954cb1e9c42c3854e40855fdcf5ab235 git.kernel.org: https://git.kernel.org/stable/c/3373f263bb647fcc3b5237cfaef757633b9ee25e git.kernel.org: https://git.kernel.org/stable/c/45379303124487db3a81219af7565d41f498167f git.kernel.org: https://git.kernel.org/stable/c/3a01b2614e84361aa222f67bc628593987e5cdb2 git.kernel.org: https://git.kernel.org/stable/c/2eead19334516c8e9927c11b448fbe512b1f18a1