CVE-2025-37972
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
20/05/2025
Last modified:
16/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Input: mtk-pmic-keys - fix possible null pointer dereference<br />
<br />
In mtk_pmic_keys_probe, the regs parameter is only set if the button is<br />
parsed in the device tree. However, on hardware where the button is left<br />
floating, that node will most likely be removed not to enable that<br />
input. In that case the code will try to dereference a null pointer.<br />
<br />
Let&#39;s use the regs struct instead as it is defined for all supported<br />
platforms. Note that it is ok setting the key reg even if that latter is<br />
disabled as the interrupt won&#39;t be enabled anyway.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0 (including) | 6.1.139 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.91 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.29 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.14.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/09429ddb5a91e9e8f72cd18c012ec4171c2f85ec
- https://git.kernel.org/stable/c/11cdb506d0fbf5ac05bf55f5afcb3a215c316490
- https://git.kernel.org/stable/c/334d74a798463ceec02a41eb0e2354aaac0d6249
- https://git.kernel.org/stable/c/619c05fb176c272ac6cecf723446b39723ee6d97
- https://git.kernel.org/stable/c/90fa6015ff83ef1c373cc61b7c924ab2bcbe1801
- https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html



