U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-40030 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: pinctrl: check the return value of pinmux_ops::get_function_name() While the API contract in docs doesn't specify it explicitly, the generic implementation of the get_function_name() callback from struct pinmux_ops - pinmux_generic_get_function_name() - can fail and return NULL. This is already checked in pinmux_check_ops() so add a similar check in pinmux_func_name_to_selector() instead of passing the returned pointer right down to strcmp() where the NULL can get dereferenced. This is normal operation when adding new pinfunctions.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/1a2ea887a5cd7d47bab599f733d89444df018b1a kernel.org
https://git.kernel.org/stable/c/1a7fc8fed2bb2e113604fde7a45432ace2056b97 kernel.org
https://git.kernel.org/stable/c/4002ee98c022d671ecc1e4a84029e9ae7d8a5603 kernel.org
https://git.kernel.org/stable/c/688c688e0bf55824f4a38f8c2180046f089a3e3b kernel.org
https://git.kernel.org/stable/c/b7e0535060a60cc99eafc19cc665d979714cd73a kernel.org
https://git.kernel.org/stable/c/ba7f7c2b2b3261e7def67018c38c69b626e0e66e kernel.org
https://git.kernel.org/stable/c/d77ef2f621cd1d605372c4c6ce667c496f6990c3 kernel.org
https://git.kernel.org/stable/c/e7265dc4c670b89611bcf5fe33acf99bc0aa294f kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-40030
NVD Published Date:
10/28/2025
NVD Last Modified:
10/29/2025
Source:
kernel.org