Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-37758
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-01 May, 2025 | 12:56
Updated At-03 Nov, 2025 | 19:54
Rejected At-
▼CVE Numbering Authority (CNA)
ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe()

In the Linux kernel, the following vulnerability has been resolved: ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe() devm_ioremap() returns NULL on error. Currently, pxa_ata_probe() does not check for this case, which can result in a NULL pointer dereference. Add NULL check after devm_ioremap() to prevent this issue.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/ata/pata_pxa.c
Default Status
unaffected
Versions
Affected
  • From 2dc6c6f15da97cb3e810963c80e981f19d42cd7d before a551f75401793ba8075d7f46ffc931ce5151f03f (git)
  • From 2dc6c6f15da97cb3e810963c80e981f19d42cd7d before 17d5e6e915fad5a261db3698c9c5bbe702102d7c (git)
  • From 2dc6c6f15da97cb3e810963c80e981f19d42cd7d before d0d720f9282839b9db625a376c02a1426a16b0ae (git)
  • From 2dc6c6f15da97cb3e810963c80e981f19d42cd7d before 2dc53c7a0c1f57b082931facafa804a7ca32a9a6 (git)
  • From 2dc6c6f15da97cb3e810963c80e981f19d42cd7d before 5b09bf6243b0bc0ae58bd9efdf6f0de5546f8d06 (git)
  • From 2dc6c6f15da97cb3e810963c80e981f19d42cd7d before ee2b0301d6bfe16b35d57947687c664ecb815775 (git)
  • From 2dc6c6f15da97cb3e810963c80e981f19d42cd7d before c022287f6e599422511aa227dc6da37b58d9ceac (git)
  • From 2dc6c6f15da97cb3e810963c80e981f19d42cd7d before 2ba9e4c69207777bb0775c7c091800ecd69de144 (git)
  • From 2dc6c6f15da97cb3e810963c80e981f19d42cd7d before ad320e408a8c95a282ab9c05cdf0c9b95e317985 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/ata/pata_pxa.c
Default Status
affected
Versions
Affected
  • 2.6.36
Unaffected
  • From 0 before 2.6.36 (semver)
  • From 5.4.293 through 5.4.* (semver)
  • From 5.10.237 through 5.10.* (semver)
  • From 5.15.181 through 5.15.* (semver)
  • From 6.1.135 through 6.1.* (semver)
  • From 6.6.88 through 6.6.* (semver)
  • From 6.12.24 through 6.12.* (semver)
  • From 6.13.12 through 6.13.* (semver)
  • From 6.14.3 through 6.14.* (semver)
  • From 6.15 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/a551f75401793ba8075d7f46ffc931ce5151f03f
N/A
https://git.kernel.org/stable/c/17d5e6e915fad5a261db3698c9c5bbe702102d7c
N/A
https://git.kernel.org/stable/c/d0d720f9282839b9db625a376c02a1426a16b0ae
N/A
https://git.kernel.org/stable/c/2dc53c7a0c1f57b082931facafa804a7ca32a9a6
N/A
https://git.kernel.org/stable/c/5b09bf6243b0bc0ae58bd9efdf6f0de5546f8d06
N/A
https://git.kernel.org/stable/c/ee2b0301d6bfe16b35d57947687c664ecb815775
N/A
https://git.kernel.org/stable/c/c022287f6e599422511aa227dc6da37b58d9ceac
N/A
https://git.kernel.org/stable/c/2ba9e4c69207777bb0775c7c091800ecd69de144
N/A
https://git.kernel.org/stable/c/ad320e408a8c95a282ab9c05cdf0c9b95e317985
N/A
Hyperlink: https://git.kernel.org/stable/c/a551f75401793ba8075d7f46ffc931ce5151f03f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/17d5e6e915fad5a261db3698c9c5bbe702102d7c
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d0d720f9282839b9db625a376c02a1426a16b0ae
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2dc53c7a0c1f57b082931facafa804a7ca32a9a6
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5b09bf6243b0bc0ae58bd9efdf6f0de5546f8d06
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/ee2b0301d6bfe16b35d57947687c664ecb815775
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c022287f6e599422511aa227dc6da37b58d9ceac
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2ba9e4c69207777bb0775c7c091800ecd69de144
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/ad320e408a8c95a282ab9c05cdf0c9b95e317985
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
Resource: N/A
Details not found