CVE-2025-40029
Description
In the Linux kernel, the following vulnerability has been resolved:
bus: fsl-mc: Check return value of platform_get_resource()
platform_get_resource() returns NULL in case of failure, so check its return value and propagate the error in order to prevent NULL pointer dereference.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A missing return value check in the Linux kernel's fsl-mc bus driver could lead to a NULL pointer dereference, fixed by validating platform_get_resource().
Vulnerability
Overview
In the Linux kernel's fsl-mc (Freescale Management Complex) bus driver, the function platform_get_resource() can return NULL when it fails to obtain a resource. The driver did not check this return value before using the pointer, creating a potential NULL pointer dereference vulnerability [1][2][3].
Exploitation
Conditions
An attacker would need to trigger a failure in platform_get_resource(), which could occur if the device tree or hardware configuration is manipulated to cause the resource lookup to fail. No special privileges are required beyond the ability to influence the system's device configuration, making this a locally exploitable issue that could lead to a kernel crash.
Impact
If successfully triggered, the NULL pointer dereference would cause a kernel panic, resulting in a denial of service (DoS). The vulnerability does not appear to allow privilege escalation or arbitrary code execution based on the available information.
Mitigation
The fix adds a check for the return value of platform_get_resource() and propagates the error if it returns NULL. This patch has been applied to the Linux kernel stable branches as commits [1], [2], and [3]. Users should update to the latest stable kernel version to remediate the issue.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
758dd05070b578a4dd74fe413e60d55692e6c78e87b8a3cf884ec0482ed9c2ead548473f525f526507b8cVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- git.kernel.org/stable/c/25f526507b8ccc6ac3a43bc094d09b1f9b0b90aenvd
- git.kernel.org/stable/c/2ead548473f58c7960b6b939b79503c4a0a2c0bdnvd
- git.kernel.org/stable/c/58dd05070b57a20f22ff35a34ef9846bdf49a1d0nvd
- git.kernel.org/stable/c/78e87b8a3cf8a59671ea25c87192d16e8d710e1cnvd
- git.kernel.org/stable/c/84ec0482ed9c9ed0aee553a5e7e7458ad79c021fnvd
- git.kernel.org/stable/c/8a4dd74fe413d4a278e649be1d22d028e1667116nvd
- git.kernel.org/stable/c/e60d55692e6c8e951000343c39f3fc92cab57efcnvd
News mentions
0No linked articles in our index yet.