Wild Pointer Dereferences in Linux Kernel Driver Core APIs
CVE-2025-21810
Summary
A vulnerability exists in the Linux kernel's driver core API that can lead to wild pointer dereferences. The issue arises during the usage of class_dev_iter_init, class_dev_iter_next, and class_dev_iter_exit functions, where uninitialized pointers may inadvertently be dereferenced. Specifically, if class_dev_iter_init fails to initialize its output parameter, it may leave the pointer in an unpredictable state. Subsequent calls to class_dev_iter_next can then result in dereferencing these wild pointers, causing potential system instability or crashes. The fix involves initializing the iterator structure within class_dev_iter_init and implementing checks to ensure the output parameter is valid before it is used.
Affected Version(s)
Linux 7b884b7f24b42fa25e92ed724ad82f137610afaf
Linux 7b884b7f24b42fa25e92ed724ad82f137610afaf < 1614e75d1a1b63db6421c7a4bf37004720c7376c
Linux 7b884b7f24b42fa25e92ed724ad82f137610afaf < 5c504e9767b947cf7d4e29b811c0c8b3c53242b7
References
Timeline
Vulnerability published
Vulnerability Reserved