{"id":"CVE-2025-40346","summary":"arch_topology: Fix incorrect error check in topology_parse_cpu_capacity()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\narch_topology: Fix incorrect error check in topology_parse_cpu_capacity()\n\nFix incorrect use of PTR_ERR_OR_ZERO() in topology_parse_cpu_capacity()\nwhich causes the code to proceed with NULL clock pointers. The current\nlogic uses !PTR_ERR_OR_ZERO(cpu_clk) which evaluates to true for both\nvalid pointers and NULL, leading to potential NULL pointer dereference\nin clk_get_rate().\n\nPer include/linux/err.h documentation, PTR_ERR_OR_ZERO(ptr) returns:\n\"The error code within @ptr if it is an error pointer; 0 otherwise.\"\n\nThis means PTR_ERR_OR_ZERO() returns 0 for both valid pointers AND NULL\npointers. Therefore !PTR_ERR_OR_ZERO(cpu_clk) evaluates to true (proceed)\nwhen cpu_clk is either valid or NULL, causing clk_get_rate(NULL) to be\ncalled when of_clk_get() returns NULL.\n\nReplace with !IS_ERR_OR_NULL(cpu_clk) which only proceeds for valid\npointers, preventing potential NULL pointer dereference in clk_get_rate().","modified":"2026-03-31T17:29:48.254157Z","published":"2025-12-16T13:30:20.395Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:20207-1","SUSE-SU-2026:20220-1","SUSE-SU-2026:20228-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:20145-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40346.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/02fbea0864fd4a863671f5d418129258d7159f68"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2eead19334516c8e9927c11b448fbe512b1f18a1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3373f263bb647fcc3b5237cfaef757633b9ee25e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3a01b2614e84361aa222f67bc628593987e5cdb2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/45379303124487db3a81219af7565d41f498167f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/64da320252e43456cc9ec3055ff567f168467b37"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a77f8434954cb1e9c42c3854e40855fdcf5ab235"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40346.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40346"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"b8fe128dad8f97cc9af7c55a264d1fc5ab677195"},{"fixed":"64da320252e43456cc9ec3055ff567f168467b37"},{"fixed":"02fbea0864fd4a863671f5d418129258d7159f68"},{"fixed":"a77f8434954cb1e9c42c3854e40855fdcf5ab235"},{"fixed":"3373f263bb647fcc3b5237cfaef757633b9ee25e"},{"fixed":"45379303124487db3a81219af7565d41f498167f"},{"fixed":"3a01b2614e84361aa222f67bc628593987e5cdb2"},{"fixed":"2eead19334516c8e9927c11b448fbe512b1f18a1"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40346.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.7.0"},{"fixed":"5.10.246"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.196"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.158"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.115"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.56"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.6"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40346.json"}}],"schema_version":"1.7.5"}