In the Linux kernel, the following vulnerability has been resolved: gpiolib: Fix crash on error in gpiochip_get_ngpios() The gpiochip_get_ngpios() uses chip_*() macros to print messages. However these macros rely on gpiodev to be initialised and set, which is not the case when called via bgpio_init(). In such a case the printing messages will crash on NULL pointer dereference. Replace chip_*() macros by the respective dev_*() ones to avoid such crash.
History

Wed, 12 Mar 2025 06:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Fri, 28 Feb 2025 02:00:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Thu, 27 Feb 2025 02:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: gpiolib: Fix crash on error in gpiochip_get_ngpios() The gpiochip_get_ngpios() uses chip_*() macros to print messages. However these macros rely on gpiodev to be initialised and set, which is not the case when called via bgpio_init(). In such a case the printing messages will crash on NULL pointer dereference. Replace chip_*() macros by the respective dev_*() ones to avoid such crash.
Title gpiolib: Fix crash on error in gpiochip_get_ngpios()
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2025-02-27T02:18:24.980Z

Updated: 2025-03-24T15:40:20.046Z

Reserved: 2024-12-29T08:45:45.765Z

Link: CVE-2025-21783

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-02-27T03:15:19.150

Modified: 2025-02-27T03:15:19.150

Link: CVE-2025-21783

cve-icon Redhat

Severity : Low

Publid Date: 2025-02-27T00:00:00Z

Links: CVE-2025-21783 - Bugzilla