-

CVE-2025-39920

In the Linux kernel, the following vulnerability has been resolved:

pcmcia: Add error handling for add_interval() in do_validate_mem()

In the do_validate_mem(), the call to add_interval() does not
handle errors. If kmalloc() fails in add_interval(), it could
result in a null pointer being inserted into the linked list,
leading to illegal memory access when sub_interval() is called
next.

This patch adds an error handling for the add_interval(). If
add_interval() returns an error, the function will return early
with the error code.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 5b60ed401b47897352c520bc724c85aa908dedcc
Version 7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status affected
Version < ae184024ef31423e5beb44cf4f52999bbcf2fe5b
Version 7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status affected
Version < 85be7ef8c8e792a414940a38d94565dd48d2f236
Version 7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status affected
Version < 06b26e3099207c94b3d1be8565aedc6edc4f0a60
Version 7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status affected
Version < 8699358b6ac99b8ccc97ed9e6e3669ef8958ef7b
Version 7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status affected
Version < 289b58f8ff3198d091074a751d6b8f6827726f3e
Version 7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status affected
Version < 369bf6e241506583f4ee7593c53b92e5a9f271b4
Version 7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status affected
Version < 4a81f78caa53e0633cf311ca1526377d9bff7479
Version 7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.34
Status affected
Version < 2.6.34
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.299
Status unaffected
Version <= 5.10.*
Version 5.10.243
Status unaffected
Version <= 5.15.*
Version 5.15.192
Status unaffected
Version <= 6.1.*
Version 6.1.151
Status unaffected
Version <= 6.6.*
Version 6.6.105
Status unaffected
Version <= 6.12.*
Version 6.12.46
Status unaffected
Version <= 6.16.*
Version 6.16.6
Status unaffected
Version <= *
Version 6.17
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.081
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String