CVE-2025-37886
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
09/05/2025
Last modified:
12/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
pds_core: make wait_context part of q_info<br />
<br />
Make the wait_context a full part of the q_info struct rather<br />
than a stack variable that goes away after pdsc_adminq_post()<br />
is done so that the context is still available after the wait<br />
loop has given up.<br />
<br />
There was a case where a slow development firmware caused<br />
the adminq request to time out, but then later the FW finally<br />
finished the request and sent the interrupt. The handler tried<br />
to complete_all() the completion context that had been created<br />
on the stack in pdsc_adminq_post() but no longer existed.<br />
This caused bad pointer usage, kernel crashes, and much wailing<br />
and gnashing of teeth.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.4 (including) | 6.6.89 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.26 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.14.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



