CVE-2025-37894NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
OSV7.8
EPSS
0.0%
top 84.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 20
Latest updateAug 28

Description

In the Linux kernel, the following vulnerability has been resolved: net: use sock_gen_put() when sk_state is TCP_TIME_WAIT It is possible for a pointer of type struct inet_timewait_sock to be returned from the functions __inet_lookup_established() and __inet6_lookup_established(). This can cause a crash when the returned pointer is of type struct inet_timewait_sock and sock_put() is called on it. The following is a crash call stack that shows sk->sk_wmem_alloc being accessed in sk_free() durin

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages5 packages

NVDlinux/linux_kernel6.106.12.28+2
Debianlinux/linux_kernel< 6.12.29-1+1
Ubuntulinux/linux_kernel< 6.14.0-24.24
CVEListV5linux/linuxc9d1d23e5239f41700be69133a5769ac5ebc88a8c0dba059b118b5206e755042b15b49368a388898+3
debiandebian/linux< linux 6.12.29-1 (forky)

Patches

🔴Vulnerability Details

8
OSV
linux-azure vulnerabilities2025-08-28
OSV
linux-aws-6.14 vulnerabilities2025-07-24
OSV
linux-aws vulnerabilities2025-07-22
OSV
linux-oracle vulnerabilities2025-07-22
OSV
linux, linux-gcp, linux-raspi, linux-realtime vulnerabilities2025-07-17

📋Vendor Advisories

8
Ubuntu
Linux kernel (Azure) vulnerabilities2025-08-28
Ubuntu
Linux kernel (AWS) vulnerabilities2025-07-24
Ubuntu
Linux kernel (AWS) vulnerabilities2025-07-22
Ubuntu
Linux kernel (Oracle) vulnerabilities2025-07-22
Ubuntu
Linux kernel vulnerabilities2025-07-17
CVE-2025-37894 — NULL Pointer Dereference in Linux | cvebase