CVE-2025-37938

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
20/05/2025
Last modified:
19/12/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tracing: Verify event formats that have "%*p.."<br /> <br /> The trace event verifier checks the formats of trace events to make sure<br /> that they do not point at memory that is not in the trace event itself or<br /> in data that will never be freed. If an event references data that was<br /> allocated when the event triggered and that same data is freed before the<br /> event is read, then the kernel can crash by reading freed memory.<br /> <br /> The verifier runs at boot up (or module load) and scans the print formats<br /> of the events and checks their arguments to make sure that dereferenced<br /> pointers are safe. If the format uses "%*p.." the verifier will ignore it,<br /> and that could be dangerous. Cover this case as well.<br /> <br /> Also add to the sample code a use case of "%*pbl".

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.13 (including) 6.1.136 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.89 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.26 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.13.11 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.14 (including) 6.14.2 (excluding)
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*