CVE-2025-37886

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
09/05/2025
Last modified:
12/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> pds_core: make wait_context part of q_info<br /> <br /> Make the wait_context a full part of the q_info struct rather<br /> than a stack variable that goes away after pdsc_adminq_post()<br /> is done so that the context is still available after the wait<br /> loop has given up.<br /> <br /> There was a case where a slow development firmware caused<br /> the adminq request to time out, but then later the FW finally<br /> finished the request and sent the interrupt. The handler tried<br /> to complete_all() the completion context that had been created<br /> on the stack in pdsc_adminq_post() but no longer existed.<br /> This caused bad pointer usage, kernel crashes, and much wailing<br /> and gnashing of teeth.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.4 (including) 6.6.89 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.26 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.14.5 (excluding)
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*