In the Linux kernel, the following vulnerability has been resolved:
pcmcia: Add error handling for add_interval() in do_validate_mem()
In the do_validate_mem(), the call to add_interval() does not
handle errors. If kmalloc() fails in add_interval(), it could
result in a null pointer being inserted into the linked list,
leading to illegal memory access when sub_interval() is called
next.
This patch adds an error handling for the add_interval(). If
add_interval() returns an error, the function will return early
with the error code.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
16 Jan 2026, 19:51
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/06b26e3099207c94b3d1be8565aedc6edc4f0a60 - Patch | |
| References | () https://git.kernel.org/stable/c/289b58f8ff3198d091074a751d6b8f6827726f3e - Patch | |
| References | () https://git.kernel.org/stable/c/369bf6e241506583f4ee7593c53b92e5a9f271b4 - Patch | |
| References | () https://git.kernel.org/stable/c/4a81f78caa53e0633cf311ca1526377d9bff7479 - Patch | |
| References | () https://git.kernel.org/stable/c/5b60ed401b47897352c520bc724c85aa908dedcc - Patch | |
| References | () https://git.kernel.org/stable/c/85be7ef8c8e792a414940a38d94565dd48d2f236 - Patch | |
| References | () https://git.kernel.org/stable/c/8699358b6ac99b8ccc97ed9e6e3669ef8958ef7b - Patch | |
| References | () https://git.kernel.org/stable/c/ae184024ef31423e5beb44cf4f52999bbcf2fe5b - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List | |
| CWE | CWE-476 |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
01 Oct 2025, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-01 08:15
Updated : 2026-01-16 19:51
NVD link : CVE-2025-39920
Mitre link : CVE-2025-39920
CVE.ORG link : CVE-2025-39920
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
