CVE-2025-68177
Description
In the Linux kernel, the following vulnerability has been resolved:
cpufreq/longhaul: handle NULL policy in longhaul_exit
longhaul_exit() was calling cpufreq_cpu_get(0) without checking for a NULL policy pointer. On some systems, this could lead to a NULL dereference and a kernel warning or panic.
This patch adds a check using unlikely() and returns early if the policy is NULL.
Bugzilla: #219962
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A NULL pointer dereference in the Linux kernel's cpufreq longhaul_exit() function could cause a kernel crash on systems using the longhaul CPU frequency scaling driver.
Overview
In the Linux kernel, the longhaul_exit() function in the cpufreq/longhaul driver called cpufreq_cpu_get(0) without first verifying that the returned policy pointer was not NULL. The kernel's official description notes that on some systems this could lead to a NULL pointer dereference, resulting in a kernel warning or panic [1].
Exploitation
To trigger this vulnerability, an attacker would need to be able to unload the longhaul cpufreq driver or cause its exit routine to be invoked. The prerequisite is a system where the longhaul driver is in use and where cpufreq_cpu_get(0) returns NULL pointer dereference) may return NULL. The attack requires local access or the ability to manipulate CPU frequency scaling module states. The bug is reachable through normal module unload sequences when the policy is unexpectedly missing.
Impact
A successful exploitation can cause a denial of service (kernel panic) on affected systems, potentially crashing the machine or causing instability. No privilege escalation is described.
Mitigation
The fix adds a check using the unlikely() macro and returns early if the policy is NULL [1] pointer is NULL. Patched versions are available via the stable kernel trees [1][2][3]. Administrators should update to a kernel version containing the commit.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- git.kernel.org/stable/c/55cf586b9556863e3c2a45460aba71bcb2be5bcdnvd
- git.kernel.org/stable/c/592532a77b736b5153e0c2e4c74aa50af0a352abnvd
- git.kernel.org/stable/c/64adabb6d9d51b7e7c02fe733346a2c4dd738488nvd
- git.kernel.org/stable/c/809cf2a7794ca4c14c304b349f4c3ae220701ce4nvd
- git.kernel.org/stable/c/8d6791c480f22d6e9a566eaa77336d3d37c5c591nvd
- git.kernel.org/stable/c/956b56d17a89775e4957bbddefa45cd3c6c71000nvd
- git.kernel.org/stable/c/b02352dd2e6cca98777714cc2a27553191df70dbnvd
- git.kernel.org/stable/c/fd93e1d71b3b14443092919be12b1abf08de35ebnvd
News mentions
0No linked articles in our index yet.