VYPR
Unrated severityNVD Advisory· Published Nov 12, 2025· Updated Apr 15, 2026

CVE-2025-40156

CVE-2025-40156

Description

In the Linux kernel, the following vulnerability has been resolved:

PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()

The drv->sram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which would lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check that the pointer is valid.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, a potential error pointer dereference in mtk-cci devfreq driver probe could cause a NULL pointer dereference if drv->sram_reg is ERR_PTR(-EPROBE_DEFER).

Vulnerability

In the Linux kernel's MediaTek CCI (Cache Coherent Interconnect) devfreq driver, the probe function fails to properly check the drv->sram_reg pointer before dereferencing it. The pointer can be set to ERR_PTR(-EPROBE_DEFER) by the devm_regulator_get_optional() call, leading to a potential error pointer dereference when the driver later accesses sram_reg without validation [1]. The fix replaces a NULL check with IS_ERR_OR_NULL() to cover both valid and error pointers.

Exploitation

An attacker would need to trigger the probe of the mtk-cci devfreq driver on a vulnerable kernel. This could occur during system boot or when the driver is loaded, typically requiring local access or a crafted device tree. The condition -EPROBE_DEFER may arise if the required regulator is not yet available, causing the driver to defer its probe. If the driver later attempts to use the error pointer without proper handling, a kernel crash (oops) may occur.

Impact

A successful exploitation leads to a denial of service (system crash) due to a kernel NULL pointer dereference or invalid memory access. This affects kernel stability, potentially causing system unavailability.

Mitigation

The vulnerability is fixed in Linux kernel versions that include the commit (fc33bf0e097c) and an additional stable backport (44e32104cf7e) [1][2]. Users should update to the latest stable kernel containing these patches.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

5

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.