CVE-2025-38122

In the Linux kernel, the following vulnerability has been resolved: gve: add missing NULL check for gve_alloc_pending_packet() in TX DQO gve_alloc_pending_packet() can return NULL, but gve_tx_add_skb_dqo() did not check for this case before dereferencing the returned pointer. Add a missing NULL check to prevent a potential NULL pointer dereference when allocation fails. This improves robustness in low-memory scenarios.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

17 Dec 2025, 18:11

Type Values Removed Values Added
CWE CWE-476
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/12c331b29c7397ac3b03584e12902990693bc248 - () https://git.kernel.org/stable/c/12c331b29c7397ac3b03584e12902990693bc248 - Patch
References () https://git.kernel.org/stable/c/2e5ead9e4e91fbe7799bd38afd8904543be1cb51 - () https://git.kernel.org/stable/c/2e5ead9e4e91fbe7799bd38afd8904543be1cb51 - Patch
References () https://git.kernel.org/stable/c/7f6265fce3bd424ded666481b37f106d7915fb6b - () https://git.kernel.org/stable/c/7f6265fce3bd424ded666481b37f106d7915fb6b - Patch
References () https://git.kernel.org/stable/c/a0319c9b1648a67511e947a596ca86888451c0a7 - () https://git.kernel.org/stable/c/a0319c9b1648a67511e947a596ca86888451c0a7 - Patch
References () https://git.kernel.org/stable/c/ae98a1787fdcb0096d122bc80d93c3c7d812c04b - () https://git.kernel.org/stable/c/ae98a1787fdcb0096d122bc80d93c3c7d812c04b - Patch
References () https://git.kernel.org/stable/c/c741a7ef68023ac800054e2131c3e22e647fd7e3 - () https://git.kernel.org/stable/c/c741a7ef68023ac800054e2131c3e22e647fd7e3 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory

03 Nov 2025, 18:16

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gve: se ha añadido la comprobación de valores nulos (NULL) faltante para gve_alloc_pending_packet() en TX DQO. gve_alloc_pending_packet() puede devolver valores nulos (NULL), pero gve_tx_add_skb_dqo() no los comprobaba antes de desreferenciar el puntero devuelto. Se ha añadido una comprobación de valores nulos (NULL) faltante para evitar una posible desreferencia de punteros nulos cuando falla la asignación. Esto mejora la robustez en escenarios con poca memoria.
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

03 Jul 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-03 09:15

Updated : 2025-12-17 18:11


NVD link : CVE-2025-38122

Mitre link : CVE-2025-38122

CVE.ORG link : CVE-2025-38122


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference