CVE-2025-37841

In the Linux kernel, the following vulnerability has been resolved: pm: cpupower: bench: Prevent NULL dereference on malloc failure If malloc returns NULL due to low memory, 'config' pointer can be NULL. Add a check to prevent NULL dereference.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

17 Nov 2025, 12:50

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
CWE CWE-476
First Time Debian debian Linux
Linux
Debian
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/0e297a02e03dceb2874789ca40bd4e65c5371704 - () https://git.kernel.org/stable/c/0e297a02e03dceb2874789ca40bd4e65c5371704 - Patch
References () https://git.kernel.org/stable/c/208baa3ec9043a664d9acfb8174b332e6b17fb69 - () https://git.kernel.org/stable/c/208baa3ec9043a664d9acfb8174b332e6b17fb69 - Patch
References () https://git.kernel.org/stable/c/34a9394794b0f97af6afedc0c9ee2012c24b28ed - () https://git.kernel.org/stable/c/34a9394794b0f97af6afedc0c9ee2012c24b28ed - Patch
References () https://git.kernel.org/stable/c/5e38122aa3fd0f9788186e86a677925bfec0b2d1 - () https://git.kernel.org/stable/c/5e38122aa3fd0f9788186e86a677925bfec0b2d1 - Patch
References () https://git.kernel.org/stable/c/79bded9d70142d2a11d931fc029afece471641db - () https://git.kernel.org/stable/c/79bded9d70142d2a11d931fc029afece471641db - Patch
References () https://git.kernel.org/stable/c/87b9f0867c0afa7e892f4b30c36cff6bf2707f85 - () https://git.kernel.org/stable/c/87b9f0867c0afa7e892f4b30c36cff6bf2707f85 - Patch
References () https://git.kernel.org/stable/c/942a4b97fc77516678b1d8af1521ff9a94c13b3e - () https://git.kernel.org/stable/c/942a4b97fc77516678b1d8af1521ff9a94c13b3e - Patch
References () https://git.kernel.org/stable/c/ceec06f464d5cfc0ba966225f7d50506ceb62242 - () https://git.kernel.org/stable/c/ceec06f464d5cfc0ba966225f7d50506ceb62242 - Patch
References () https://git.kernel.org/stable/c/f8d28fa305b78c5d1073b63f26db265ba8291ae1 - () https://git.kernel.org/stable/c/f8d28fa305b78c5d1073b63f26db265ba8291ae1 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html -
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

12 May 2025, 17:32

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pm: cpupower: bench: Evitar la desreferenciación de valores NULL en caso de fallo de malloc. Si malloc devuelve NULL debido a poca memoria, el puntero 'config' puede ser NULL. Se ha añadido una comprobación para evitar la desreferenciación de valores NULL.

09 May 2025, 07:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-09 07:16

Updated : 2025-11-17 12:50


NVD link : CVE-2025-37841

Mitre link : CVE-2025-37841

CVE.ORG link : CVE-2025-37841


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference