CVE-2025-37844

In the Linux kernel, the following vulnerability has been resolved: cifs: avoid NULL pointer dereference in dbg call cifs_server_dbg() implies server to be non-NULL so move call under condition to avoid NULL pointer dereference. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

17 Nov 2025, 12:49

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/20048e658652e731f5cadf4a695925e570ca0ff9 - () https://git.kernel.org/stable/c/20048e658652e731f5cadf4a695925e570ca0ff9 - Patch
References () https://git.kernel.org/stable/c/6c14ee6af8f1f188b668afd6d003f7516a507b08 - () https://git.kernel.org/stable/c/6c14ee6af8f1f188b668afd6d003f7516a507b08 - Patch
References () https://git.kernel.org/stable/c/864ba5c651b03830f36f0906c21af05b15c1aaa6 - () https://git.kernel.org/stable/c/864ba5c651b03830f36f0906c21af05b15c1aaa6 - Patch
References () https://git.kernel.org/stable/c/9c9000cb91b986eb7f75835340c67857ab97c09b - () https://git.kernel.org/stable/c/9c9000cb91b986eb7f75835340c67857ab97c09b - Patch
References () https://git.kernel.org/stable/c/b2a1833e1c63e2585867ebeaf4dd41494dcede4b - () https://git.kernel.org/stable/c/b2a1833e1c63e2585867ebeaf4dd41494dcede4b - Patch
References () https://git.kernel.org/stable/c/b4885bd5935bb26f0a414ad55679a372e53f9b9b - () https://git.kernel.org/stable/c/b4885bd5935bb26f0a414ad55679a372e53f9b9b - Patch
References () https://git.kernel.org/stable/c/ba3ce6c60cd5db258687dfeba9fc608f5e7cadf3 - () https://git.kernel.org/stable/c/ba3ce6c60cd5db258687dfeba9fc608f5e7cadf3 - Patch
References () https://git.kernel.org/stable/c/e0717385f5c51e290c2cd2ad4699a778316b5132 - () https://git.kernel.org/stable/c/e0717385f5c51e290c2cd2ad4699a778316b5132 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html -
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

12 May 2025, 17:32

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: evitar la desreferencia de puntero nulo en la llamada a dbg. cifs_server_dbg() implica que el servidor no es nulo, por lo que se mueve la llamada bajo condición para evitar la desreferencia de puntero nulo. Encontrada por el Centro de Verificación de Linux (linuxtesting.org) con SVACE.

09 May 2025, 07:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-09 07:16

Updated : 2025-11-17 12:49


NVD link : CVE-2025-37844

Mitre link : CVE-2025-37844

CVE.ORG link : CVE-2025-37844


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference