CVE-2025-39920

In the Linux kernel, the following vulnerability has been resolved: pcmcia: Add error handling for add_interval() in do_validate_mem() In the do_validate_mem(), the call to add_interval() does not handle errors. If kmalloc() fails in add_interval(), it could result in a null pointer being inserted into the linked list, leading to illegal memory access when sub_interval() is called next. This patch adds an error handling for the add_interval(). If add_interval() returns an error, the function will return early with the error code.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

16 Jan 2026, 19:51

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/06b26e3099207c94b3d1be8565aedc6edc4f0a60 - () https://git.kernel.org/stable/c/06b26e3099207c94b3d1be8565aedc6edc4f0a60 - Patch
References () https://git.kernel.org/stable/c/289b58f8ff3198d091074a751d6b8f6827726f3e - () https://git.kernel.org/stable/c/289b58f8ff3198d091074a751d6b8f6827726f3e - Patch
References () https://git.kernel.org/stable/c/369bf6e241506583f4ee7593c53b92e5a9f271b4 - () https://git.kernel.org/stable/c/369bf6e241506583f4ee7593c53b92e5a9f271b4 - Patch
References () https://git.kernel.org/stable/c/4a81f78caa53e0633cf311ca1526377d9bff7479 - () https://git.kernel.org/stable/c/4a81f78caa53e0633cf311ca1526377d9bff7479 - Patch
References () https://git.kernel.org/stable/c/5b60ed401b47897352c520bc724c85aa908dedcc - () https://git.kernel.org/stable/c/5b60ed401b47897352c520bc724c85aa908dedcc - Patch
References () https://git.kernel.org/stable/c/85be7ef8c8e792a414940a38d94565dd48d2f236 - () https://git.kernel.org/stable/c/85be7ef8c8e792a414940a38d94565dd48d2f236 - Patch
References () https://git.kernel.org/stable/c/8699358b6ac99b8ccc97ed9e6e3669ef8958ef7b - () https://git.kernel.org/stable/c/8699358b6ac99b8ccc97ed9e6e3669ef8958ef7b - Patch
References () https://git.kernel.org/stable/c/ae184024ef31423e5beb44cf4f52999bbcf2fe5b - () https://git.kernel.org/stable/c/ae184024ef31423e5beb44cf4f52999bbcf2fe5b - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List
CWE CWE-476

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

01 Oct 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-01 08:15

Updated : 2026-01-16 19:51


NVD link : CVE-2025-39920

Mitre link : CVE-2025-39920

CVE.ORG link : CVE-2025-39920


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference