CVE-2025-37820
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
08/05/2025
Last modified:
12/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
xen-netfront: handle NULL returned by xdp_convert_buff_to_frame()<br />
<br />
The function xdp_convert_buff_to_frame() may return NULL if it fails<br />
to correctly convert the XDP buffer into an XDP frame due to memory<br />
constraints, internal errors, or invalid data. Failing to check for NULL<br />
may lead to a NULL pointer dereference if the result is used later in<br />
processing, potentially causing crashes, data corruption, or undefined<br />
behavior.<br />
<br />
On XDP redirect failure, the associated page must be released explicitly<br />
if it was previously retained via get_page(). Failing to do so may result<br />
in a memory leak, as the pages reference count is not decremented.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.9 (including) | 6.1.136 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.89 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.26 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.14.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/5b83d30c63f9964acb1bc63eb8e670b9e0d2c240
- https://git.kernel.org/stable/c/cc3628dcd851ddd8d418bf0c897024b4621ddc92
- https://git.kernel.org/stable/c/cefd8a2e2de46209ce66e6d30c237eb59b6c5bfa
- https://git.kernel.org/stable/c/d6a9c4e6f9b3ec3ad98468c950ad214af8a2efb9
- https://git.kernel.org/stable/c/eefccd889df3b49d92e7349d94c4aa7e1ba19f6c
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



