Wild Pointer Dereferences in Linux Kernel Driver Core APIs
CVE-2025-21810

Currently unrated

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
27 February 2025

Summary

A vulnerability exists in the Linux kernel's driver core API that can lead to wild pointer dereferences. The issue arises during the usage of class_dev_iter_init, class_dev_iter_next, and class_dev_iter_exit functions, where uninitialized pointers may inadvertently be dereferenced. Specifically, if class_dev_iter_init fails to initialize its output parameter, it may leave the pointer in an unpredictable state. Subsequent calls to class_dev_iter_next can then result in dereferencing these wild pointers, causing potential system instability or crashes. The fix involves initializing the iterator structure within class_dev_iter_init and implementing checks to ensure the output parameter is valid before it is used.

Affected Version(s)

Linux 7b884b7f24b42fa25e92ed724ad82f137610afaf

Linux 7b884b7f24b42fa25e92ed724ad82f137610afaf < 1614e75d1a1b63db6421c7a4bf37004720c7376c

Linux 7b884b7f24b42fa25e92ed724ad82f137610afaf < 5c504e9767b947cf7d4e29b811c0c8b3c53242b7

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.