CVE-2025-37894 — NULL Pointer Dereference in Linux
CWE-476 — NULL Pointer DereferenceCWE-763 — Release of Invalid Pointer or Reference17 documents6 sources
Severity
5.5MEDIUMNVD
OSV7.8
EPSS
0.0%
top 84.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 20
Latest updateAug 28
Description
In the Linux kernel, the following vulnerability has been resolved:
net: use sock_gen_put() when sk_state is TCP_TIME_WAIT
It is possible for a pointer of type struct inet_timewait_sock to be
returned from the functions __inet_lookup_established() and
__inet6_lookup_established(). This can cause a crash when the
returned pointer is of type struct inet_timewait_sock and
sock_put() is called on it. The following is a crash call stack that
shows sk->sk_wmem_alloc being accessed in sk_free() durin…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages5 packages
▶CVEListV5linux/linuxc9d1d23e5239f41700be69133a5769ac5ebc88a8 — c0dba059b118b5206e755042b15b49368a388898+3