CVE-2025-21810

Source
https://cve.org/CVERecord?id=CVE-2025-21810
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21810.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21810
Downstream
Related
Published
2025-02-27T20:01:01.630Z
Modified
2026-03-20T12:41:11.046325Z
Summary
driver core: class: Fix wild pointer dereferences in API class_dev_iter_next()
Details

In the Linux kernel, the following vulnerability has been resolved:

driver core: class: Fix wild pointer dereferences in API classdeviter_next()

There are a potential wild pointer dereferences issue regarding APIs classdeviter_(init|next|exit)(), as explained by below typical usage:

// All members of @iter are wild pointers. struct classdeviter iter;

// classdeviterinit(@iter, @class, ...) checks parameter @class for // potential classtosubsys() error, and it returns void type and does // not initialize its output parameter @iter, so caller can not detect // the error and continues to invoke classdeviternext(@iter) even if // @iter still contains wild pointers. classdeviter_init(&iter, ...);

// Dereference these wild pointers in @iter here once suffer the error. while (dev = classdeviter_next(&iter)) { ... };

// Also dereference these wild pointers here. classdeviter_exit(&iter);

Actually, all callers of these APIs have such usage pattern in kernel tree. Fix by: - Initialize output parameter @iter by memset() in classdeviterinit() and give callers prompt by prcrit() for the error. - Check if @iter is valid in classdeviter_next().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21810.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7b884b7f24b42fa25e92ed724ad82f137610afaf
Fixed
f4b9bc823b0cfdebfed479c0e87d6939c7562e87
Fixed
1614e75d1a1b63db6421c7a4bf37004720c7376c
Fixed
5c504e9767b947cf7d4e29b811c0c8b3c53242b7
Fixed
e128f82f7006991c99a58114f70ef61e937b1ac1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21810.json"