CVE-2025-40156
Description
In the Linux kernel, the following vulnerability has been resolved:
PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()
The drv->sram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which would lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check that the pointer is valid.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel, a potential error pointer dereference in mtk-cci devfreq driver probe could cause a NULL pointer dereference if drv->sram_reg is ERR_PTR(-EPROBE_DEFER).
Vulnerability
In the Linux kernel's MediaTek CCI (Cache Coherent Interconnect) devfreq driver, the probe function fails to properly check the drv->sram_reg pointer before dereferencing it. The pointer can be set to ERR_PTR(-EPROBE_DEFER) by the devm_regulator_get_optional() call, leading to a potential error pointer dereference when the driver later accesses sram_reg without validation [1]. The fix replaces a NULL check with IS_ERR_OR_NULL() to cover both valid and error pointers.
Exploitation
An attacker would need to trigger the probe of the mtk-cci devfreq driver on a vulnerable kernel. This could occur during system boot or when the driver is loaded, typically requiring local access or a crafted device tree. The condition -EPROBE_DEFER may arise if the required regulator is not yet available, causing the driver to defer its probe. If the driver later attempts to use the error pointer without proper handling, a kernel crash (oops) may occur.
Impact
A successful exploitation leads to a denial of service (system crash) due to a kernel NULL pointer dereference or invalid memory access. This affects kernel stability, potentially causing system unavailability.
Mitigation
The vulnerability is fixed in Linux kernel versions that include the commit (fc33bf0e097c) and an additional stable backport (44e32104cf7e) [1][2]. Users should update to the latest stable kernel containing these patches.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
59cc23e221f3980eab6a9df7e44e32104cf7e24d61b6e23d2fc33bf0e097cVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/24d61b6e23d2c7291c528dd43a0bf76b5c05c8f0nvd
- git.kernel.org/stable/c/44e32104cf7e670e3d683c97b52350d8fac23322nvd
- git.kernel.org/stable/c/80eab6a9df7e1107dc334434dbacd05297703377nvd
- git.kernel.org/stable/c/9cc23e221f392304b7b8aad213812564ddf6517envd
- git.kernel.org/stable/c/fc33bf0e097c6834646b98a7b3da0ae5b617f0f9nvd
News mentions
0No linked articles in our index yet.