-

CVE-2025-39920

In the Linux kernel, the following vulnerability has been resolved:

pcmcia: Add error handling for add_interval() in do_validate_mem()

In the do_validate_mem(), the call to add_interval() does not
handle errors. If kmalloc() fails in add_interval(), it could
result in a null pointer being inserted into the linked list,
leading to illegal memory access when sub_interval() is called
next.

This patch adds an error handling for the add_interval(). If
add_interval() returns an error, the function will return early
with the error code.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 5b60ed401b47897352c520bc724c85aa908dedcc
Version 7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status affected
Version < ae184024ef31423e5beb44cf4f52999bbcf2fe5b
Version 7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status affected
Version < 85be7ef8c8e792a414940a38d94565dd48d2f236
Version 7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status affected
Version < 06b26e3099207c94b3d1be8565aedc6edc4f0a60
Version 7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status affected
Version < 8699358b6ac99b8ccc97ed9e6e3669ef8958ef7b
Version 7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status affected
Version < 289b58f8ff3198d091074a751d6b8f6827726f3e
Version 7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status affected
Version < 369bf6e241506583f4ee7593c53b92e5a9f271b4
Version 7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status affected
Version < 4a81f78caa53e0633cf311ca1526377d9bff7479
Version 7b4884ca8853a638df0eb5d251d80d67777b8b1a
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 2.6.34
Status affected
Version < 2.6.34
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.299
Status unaffected
Version <= 5.10.*
Version 5.10.243
Status unaffected
Version <= 5.15.*
Version 5.15.192
Status unaffected
Version <= 6.1.*
Version 6.1.151
Status unaffected
Version <= 6.6.*
Version 6.6.105
Status unaffected
Version <= 6.12.*
Version 6.12.46
Status unaffected
Version <= 6.16.*
Version 6.16.6
Status unaffected
Version <= *
Version 6.17
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.081
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string