{"id":"CVE-2025-21810","summary":"driver core: class: Fix wild pointer dereferences in API class_dev_iter_next()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: class: Fix wild pointer dereferences in API class_dev_iter_next()\n\nThere are a potential wild pointer dereferences issue regarding APIs\nclass_dev_iter_(init|next|exit)(), as explained by below typical usage:\n\n// All members of @iter are wild pointers.\nstruct class_dev_iter iter;\n\n// class_dev_iter_init(@iter, @class, ...) checks parameter @class for\n// potential class_to_subsys() error, and it returns void type and does\n// not initialize its output parameter @iter, so caller can not detect\n// the error and continues to invoke class_dev_iter_next(@iter) even if\n// @iter still contains wild pointers.\nclass_dev_iter_init(&iter, ...);\n\n// Dereference these wild pointers in @iter here once suffer the error.\nwhile (dev = class_dev_iter_next(&iter)) { ... };\n\n// Also dereference these wild pointers here.\nclass_dev_iter_exit(&iter);\n\nActually, all callers of these APIs have such usage pattern in kernel tree.\nFix by:\n- Initialize output parameter @iter by memset() in class_dev_iter_init()\n  and give callers prompt by pr_crit() for the error.\n- Check if @iter is valid in class_dev_iter_next().","modified":"2026-04-02T12:45:14.570144Z","published":"2025-02-27T20:01:01.630Z","related":["SUSE-SU-2025:01919-1","SUSE-SU-2025:1177-1","SUSE-SU-2025:1178-1","SUSE-SU-2025:1180-1","SUSE-SU-2025:20190-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20260-1","SUSE-SU-2025:20270-1","USN-7521-2"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21810.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1614e75d1a1b63db6421c7a4bf37004720c7376c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5c504e9767b947cf7d4e29b811c0c8b3c53242b7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e128f82f7006991c99a58114f70ef61e937b1ac1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f4b9bc823b0cfdebfed479c0e87d6939c7562e87"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21810.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21810"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7b884b7f24b42fa25e92ed724ad82f137610afaf"},{"fixed":"f4b9bc823b0cfdebfed479c0e87d6939c7562e87"},{"fixed":"1614e75d1a1b63db6421c7a4bf37004720c7376c"},{"fixed":"5c504e9767b947cf7d4e29b811c0c8b3c53242b7"},{"fixed":"e128f82f7006991c99a58114f70ef61e937b1ac1"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21810.json"}}],"schema_version":"1.7.5"}