CVE-2025-37788
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2025
Last modified:
06/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path<br />
<br />
In the for loop used to allocate the loc_array and bmap for each port, a<br />
memory leak is possible when the allocation for loc_array succeeds,<br />
but the allocation for bmap fails. This is because when the control flow<br />
goes to the label free_eth_finfo, only the allocations starting from<br />
(i-1)th iteration are freed.<br />
<br />
Fix that by freeing the loc_array in the bmap allocation error path.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.9 (including) | 5.10.237 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.181 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.135 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.88 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.25 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.14.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/00ffb3724ce743578163f5ade2884374554ca021
- https://git.kernel.org/stable/c/08aa59c0be768596467552c129e9f82166779a67
- https://git.kernel.org/stable/c/118d05b530343cd9322607b9719405ba254a4183
- https://git.kernel.org/stable/c/76deedea08899885f076aba0bb80bd1276446822
- https://git.kernel.org/stable/c/dafb6e433ab2333b67be05433dc9c6ccbc7b1284
- https://git.kernel.org/stable/c/e9de08e15aee35b96064960f95997bb6c1209c4b
- https://git.kernel.org/stable/c/fa2d7708955e4f8212fd69bab1da604e60cb0b15
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



