-
CVE-2025-39920
- EPSS 0.03%
- Veröffentlicht 01.10.2025 08:15:35
- Zuletzt bearbeitet 02.10.2025 19:12:17
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: pcmcia: Add error handling for add_interval() in do_validate_mem() In the do_validate_mem(), the call to add_interval() does not handle errors. If kmalloc() fails in add_interval(), it could result in a null pointer being inserted into the linked list, leading to illegal memory access when sub_interval() is called next. This patch adds an error handling for the add_interval(). If add_interval() returns an error, the function will return early with the error code.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
5b60ed401b47897352c520bc724c85aa908dedcc
Version
7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status
affected
Version <
ae184024ef31423e5beb44cf4f52999bbcf2fe5b
Version
7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status
affected
Version <
85be7ef8c8e792a414940a38d94565dd48d2f236
Version
7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status
affected
Version <
06b26e3099207c94b3d1be8565aedc6edc4f0a60
Version
7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status
affected
Version <
8699358b6ac99b8ccc97ed9e6e3669ef8958ef7b
Version
7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status
affected
Version <
289b58f8ff3198d091074a751d6b8f6827726f3e
Version
7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status
affected
Version <
369bf6e241506583f4ee7593c53b92e5a9f271b4
Version
7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status
affected
Version <
4a81f78caa53e0633cf311ca1526377d9bff7479
Version
7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.34
Status
affected
Version <
2.6.34
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.299
Status
unaffected
Version <=
5.10.*
Version
5.10.243
Status
unaffected
Version <=
5.15.*
Version
5.15.192
Status
unaffected
Version <=
6.1.*
Version
6.1.151
Status
unaffected
Version <=
6.6.*
Version
6.6.105
Status
unaffected
Version <=
6.12.*
Version
6.12.46
Status
unaffected
Version <=
6.16.*
Version
6.16.6
Status
unaffected
Version <=
*
Version
6.17
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.081 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|