CVE-2025-37972

In the Linux kernel, the following vulnerability has been resolved: Input: mtk-pmic-keys - fix possible null pointer dereference In mtk_pmic_keys_probe, the regs parameter is only set if the button is parsed in the device tree. However, on hardware where the button is left floating, that node will most likely be removed not to enable that input. In that case the code will try to dereference a null pointer. Let's use the regs struct instead as it is defined for all supported platforms. Note that it is ok setting the key reg even if that latter is disabled as the interrupt won't be enabled anyway.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

16 Dec 2025, 20:31

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/09429ddb5a91e9e8f72cd18c012ec4171c2f85ec - () https://git.kernel.org/stable/c/09429ddb5a91e9e8f72cd18c012ec4171c2f85ec - Patch
References () https://git.kernel.org/stable/c/11cdb506d0fbf5ac05bf55f5afcb3a215c316490 - () https://git.kernel.org/stable/c/11cdb506d0fbf5ac05bf55f5afcb3a215c316490 - Patch
References () https://git.kernel.org/stable/c/334d74a798463ceec02a41eb0e2354aaac0d6249 - () https://git.kernel.org/stable/c/334d74a798463ceec02a41eb0e2354aaac0d6249 - Patch
References () https://git.kernel.org/stable/c/619c05fb176c272ac6cecf723446b39723ee6d97 - () https://git.kernel.org/stable/c/619c05fb176c272ac6cecf723446b39723ee6d97 - Patch
References () https://git.kernel.org/stable/c/90fa6015ff83ef1c373cc61b7c924ab2bcbe1801 - () https://git.kernel.org/stable/c/90fa6015ff83ef1c373cc61b7c924ab2bcbe1801 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html - () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html - Third Party Advisory

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Entrada: mtk-pmic-keys - corrección de posible desreferencia de puntero nulo. En mtk_pmic_keys_probe, el parámetro regs solo se establece si el botón se analiza en el árbol de dispositivos. Sin embargo, en hardware donde el botón se deja flotante, es muy probable que se elimine ese nodo para no habilitar esa entrada. En ese caso, el código intentará desreferenciar un puntero nulo. En su lugar, usemos la estructura regs, tal como está definida para todas las plataformas compatibles. Tenga en cuenta que es posible establecer el registro de clave incluso si este último está deshabilitado, ya que la interrupción no se habilitará de todos modos.

20 May 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-20 17:15

Updated : 2025-12-16 20:31


NVD link : CVE-2025-37972

Mitre link : CVE-2025-37972

CVE.ORG link : CVE-2025-37972


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference