In the Linux kernel, the following vulnerability has been resolved:
afs: Fix potential null pointer dereference in afsputserver
afsputserver() accessed server->debugid before the NULL check, which could lead to a null pointer dereference. Move the debugid assignment, ensuring we never dereference a NULL server pointer.
[
{
"id": "CVE-2025-40010-044f5dfa",
"target": {
"function": "afs_put_server",
"file": "fs/afs/server.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9158c6bb245113d4966df9b2ba602197a379412e",
"deprecated": false,
"digest": {
"length": 335.0,
"function_hash": "38444634076704883940176484058561176766"
},
"signature_type": "Function"
},
{
"id": "CVE-2025-40010-3bd283e5",
"target": {
"file": "fs/afs/server.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cab278cead49a547ac84c3e185f446f381303eae",
"deprecated": false,
"digest": {
"line_hashes": [
"246262261049481156089595476564103292124",
"312239927818137539456371170148090298739",
"230349989344533832993676880608343417805",
"204495232263528418373012089634275277567",
"209641577239967293668749102888428241434",
"277330581767386078395500567864759743320",
"249444890628985545271849149203911848000",
"165122772082984708211956636738637193323"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2025-40010-58db8807",
"target": {
"file": "fs/afs/server.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7b8381f3c405b864a814d747e526e078c3ef4bc2",
"deprecated": false,
"digest": {
"line_hashes": [
"246262261049481156089595476564103292124",
"312239927818137539456371170148090298739",
"230349989344533832993676880608343417805",
"204495232263528418373012089634275277567",
"209641577239967293668749102888428241434",
"277330581767386078395500567864759743320",
"249444890628985545271849149203911848000",
"165122772082984708211956636738637193323"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2025-40010-648b6279",
"target": {
"file": "fs/afs/server.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9158c6bb245113d4966df9b2ba602197a379412e",
"deprecated": false,
"digest": {
"line_hashes": [
"246262261049481156089595476564103292124",
"312239927818137539456371170148090298739",
"230349989344533832993676880608343417805",
"204495232263528418373012089634275277567",
"209641577239967293668749102888428241434",
"277330581767386078395500567864759743320",
"249444890628985545271849149203911848000",
"165122772082984708211956636738637193323"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2025-40010-837e04c3",
"target": {
"function": "afs_put_server",
"file": "fs/afs/server.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cab278cead49a547ac84c3e185f446f381303eae",
"deprecated": false,
"digest": {
"length": 335.0,
"function_hash": "38444634076704883940176484058561176766"
},
"signature_type": "Function"
},
{
"id": "CVE-2025-40010-f49b56c2",
"target": {
"function": "afs_put_server",
"file": "fs/afs/server.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7b8381f3c405b864a814d747e526e078c3ef4bc2",
"deprecated": false,
"digest": {
"length": 335.0,
"function_hash": "38444634076704883940176484058561176766"
},
"signature_type": "Function"
}
]