CVE-2025-40033
Description
In the Linux kernel, the following vulnerability has been resolved:
remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()
pru_rproc_set_ctable() accessed rproc->priv before the IS_ERR_OR_NULL check, which could lead to a null pointer dereference. Move the pru assignment, ensuring we never dereference a NULL rproc pointer.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A null pointer dereference in the Linux kernel's PRU remoteproc driver could be triggered by accessing rproc->priv before validation.
Vulnerability
In the Linux kernel's PRU (Programmable Real-Time Unit) remoteproc driver, the function pru_rproc_set_ctable() accesses rproc->priv before performing an IS_ERR_OR_NULL check on the rproc pointer. This ordering flaw can lead to a NULL pointer dereference if a NULL or error-valued rproc is passed to the function [1].
Exploitation
The vulnerability is present in the kernel source code and can be triggered when the pru_rproc_set_ctable() function is called with an invalid rproc pointer. No special privileges or authentication are required beyond the ability to trigger the affected code path, which may occur during normal driver operations or through crafted inputs that cause the driver to receive a NULL pointer [1].
Impact
A successful exploit could cause a denial of service (system crash or kernel panic) due to the NULL pointer dereference. The impact is limited to availability; there is no evidence of privilege escalation or data corruption from this bug [1].
Mitigation
The fix, committed to the Linux kernel stable tree, moves the assignment of the pru variable (derived from rproc->priv) to after the IS_ERR_OR_NULL check, ensuring the pointer is validated before dereferencing [1]. Users should apply the latest kernel updates to address this vulnerability.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
466821fdb723dc9b6d789591ff0164d899501d41e075b0771Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.