CVE-2025-21810

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21810
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21810.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21810
Downstream
Related
Published
2025-02-27T20:01:01.630Z
Modified
2025-11-28T02:35:29.076883Z
Summary
driver core: class: Fix wild pointer dereferences in API class_dev_iter_next()
Details

In the Linux kernel, the following vulnerability has been resolved:

driver core: class: Fix wild pointer dereferences in API classdeviter_next()

There are a potential wild pointer dereferences issue regarding APIs classdeviter_(init|next|exit)(), as explained by below typical usage:

// All members of @iter are wild pointers. struct classdeviter iter;

// classdeviterinit(@iter, @class, ...) checks parameter @class for // potential classtosubsys() error, and it returns void type and does // not initialize its output parameter @iter, so caller can not detect // the error and continues to invoke classdeviternext(@iter) even if // @iter still contains wild pointers. classdeviter_init(&iter, ...);

// Dereference these wild pointers in @iter here once suffer the error. while (dev = classdeviter_next(&iter)) { ... };

// Also dereference these wild pointers here. classdeviter_exit(&iter);

Actually, all callers of these APIs have such usage pattern in kernel tree. Fix by: - Initialize output parameter @iter by memset() in classdeviterinit() and give callers prompt by prcrit() for the error. - Check if @iter is valid in classdeviter_next().

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21810.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7b884b7f24b42fa25e92ed724ad82f137610afaf
Fixed
f4b9bc823b0cfdebfed479c0e87d6939c7562e87
Fixed
1614e75d1a1b63db6421c7a4bf37004720c7376c
Fixed
5c504e9767b947cf7d4e29b811c0c8b3c53242b7
Fixed
e128f82f7006991c99a58114f70ef61e937b1ac1

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.4.0
Fixed
6.6.76
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.13
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.2