CVE-2025-38694
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
04/09/2025
Last modified:
22/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb()<br />
<br />
In dib7090p_rw_on_apb, msg is controlled by user. When msg[0].buf is null and<br />
msg[0].len is zero, former checks on msg[0].buf would be passed. If accessing<br />
msg[0].buf[2] without sanity check, null pointer deref would happen. We add<br />
check on msg[0].len to prevent crash. Similar issue occurs when access<br />
msg[1].buf[0] and msg[1].buf[1].<br />
<br />
Similar commit: commit 0ed554fd769a ("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()")
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.39 (including) | 5.4.297 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.241 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.190 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.149 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.103 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.43 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (including) | 6.16.2 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/09906650484a09b3a4d4b3d3065395856810becd
- https://git.kernel.org/stable/c/0bb32863426afe0badac25c28d59021f211d0f48
- https://git.kernel.org/stable/c/19eb5d8e6aa1169d368a4d69aae5572950deb89d
- https://git.kernel.org/stable/c/529fd5593b721e6f4370c591f5086649ed149ff6
- https://git.kernel.org/stable/c/a0f744d6cdde81d7382e183f77a4080a39b206cd
- https://git.kernel.org/stable/c/bc07cae4f36bb18d5b6a9ed835c1278ca44ec82e
- https://git.kernel.org/stable/c/c33280d6bd668dbdc5a5f07887cc63a52ab4789c
- https://git.kernel.org/stable/c/ce5cac69b2edac3e3246fee03e8f4c2a1075238b
- https://git.kernel.org/stable/c/ce8b7c711b9c4f040b5419729d0972db8e374324
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



