{"id":"CVE-2025-68177","summary":"cpufreq/longhaul: handle NULL policy in longhaul_exit","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq/longhaul: handle NULL policy in longhaul_exit\n\nlonghaul_exit() was calling cpufreq_cpu_get(0) without checking\nfor a NULL policy pointer. On some systems, this could lead to a\nNULL dereference and a kernel warning or panic.\n\nThis patch adds a check using unlikely() and returns early if the\npolicy is NULL.\n\nBugzilla: #219962","modified":"2026-04-16T04:42:54.883687792Z","published":"2025-12-16T13:42:56.336Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68177.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/55cf586b9556863e3c2a45460aba71bcb2be5bcd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/592532a77b736b5153e0c2e4c74aa50af0a352ab"},{"type":"WEB","url":"https://git.kernel.org/stable/c/64adabb6d9d51b7e7c02fe733346a2c4dd738488"},{"type":"WEB","url":"https://git.kernel.org/stable/c/809cf2a7794ca4c14c304b349f4c3ae220701ce4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8d6791c480f22d6e9a566eaa77336d3d37c5c591"},{"type":"WEB","url":"https://git.kernel.org/stable/c/956b56d17a89775e4957bbddefa45cd3c6c71000"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b02352dd2e6cca98777714cc2a27553191df70db"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fd93e1d71b3b14443092919be12b1abf08de35eb"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68177.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68177"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"b43a7ffbf33be7e4d3b10b7714ee663ea2c52fe2"},{"fixed":"b02352dd2e6cca98777714cc2a27553191df70db"},{"fixed":"956b56d17a89775e4957bbddefa45cd3c6c71000"},{"fixed":"55cf586b9556863e3c2a45460aba71bcb2be5bcd"},{"fixed":"fd93e1d71b3b14443092919be12b1abf08de35eb"},{"fixed":"8d6791c480f22d6e9a566eaa77336d3d37c5c591"},{"fixed":"64adabb6d9d51b7e7c02fe733346a2c4dd738488"},{"fixed":"809cf2a7794ca4c14c304b349f4c3ae220701ce4"},{"fixed":"592532a77b736b5153e0c2e4c74aa50af0a352ab"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68177.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.10.0"},{"fixed":"5.4.302"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.247"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.197"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.159"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.117"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.58"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.8"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68177.json"}}],"schema_version":"1.7.5"}