{"id":"CVE-2025-40033","summary":"remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()\n\npru_rproc_set_ctable() accessed rproc-\u003epriv before the IS_ERR_OR_NULL\ncheck, which could lead to a null pointer dereference. Move the pru\nassignment, ensuring we never dereference a NULL rproc pointer.","modified":"2026-03-31T17:29:27.671948418Z","published":"2025-10-28T11:48:15.624Z","related":["MGASA-2025-0309","MGASA-2025-0310","SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:20012-1","SUSE-SU-2026:20015-1","SUSE-SU-2026:20021-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2025:15702-1","openSUSE-SU-2025:20172-1","openSUSE-SU-2026:10301-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40033.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/66821fdb723d55b25482a76b92d17d416efeae6b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c9b6d789591f2bd57b0cbd59592493e11e029ed4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d41e075b077142bb9ae5df40b9ddf9fd7821a811"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f0164d89950120281f2446be9687cffa1e43dbcc"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40033.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40033"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"102853400321baea2527917e6e89be33508c3e18"},{"fixed":"66821fdb723d55b25482a76b92d17d416efeae6b"},{"fixed":"c9b6d789591f2bd57b0cbd59592493e11e029ed4"},{"fixed":"f0164d89950120281f2446be9687cffa1e43dbcc"},{"fixed":"d41e075b077142bb9ae5df40b9ddf9fd7821a811"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40033.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"6.3.0"},{"fixed":"6.6.112"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.53"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40033.json"}}],"schema_version":"1.7.5"}