Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-37844
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-09 May, 2025 | 06:41
Updated At-03 Nov, 2025 | 19:56
Rejected At-
▼CVE Numbering Authority (CNA)
cifs: avoid NULL pointer dereference in dbg call

In the Linux kernel, the following vulnerability has been resolved: cifs: avoid NULL pointer dereference in dbg call cifs_server_dbg() implies server to be non-NULL so move call under condition to avoid NULL pointer dereference. Found by Linux Verification Center (linuxtesting.org) with SVACE.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/smb/client/smb2misc.c
Default Status
unaffected
Versions
Affected
  • From e79b0332ae06b4895dcecddf4bbc5d3917e9383c before ba3ce6c60cd5db258687dfeba9fc608f5e7cadf3 (git)
  • From e79b0332ae06b4895dcecddf4bbc5d3917e9383c before 9c9000cb91b986eb7f75835340c67857ab97c09b (git)
  • From e79b0332ae06b4895dcecddf4bbc5d3917e9383c before b2a1833e1c63e2585867ebeaf4dd41494dcede4b (git)
  • From e79b0332ae06b4895dcecddf4bbc5d3917e9383c before 864ba5c651b03830f36f0906c21af05b15c1aaa6 (git)
  • From e79b0332ae06b4895dcecddf4bbc5d3917e9383c before e0717385f5c51e290c2cd2ad4699a778316b5132 (git)
  • From e79b0332ae06b4895dcecddf4bbc5d3917e9383c before 20048e658652e731f5cadf4a695925e570ca0ff9 (git)
  • From e79b0332ae06b4895dcecddf4bbc5d3917e9383c before 6c14ee6af8f1f188b668afd6d003f7516a507b08 (git)
  • From e79b0332ae06b4895dcecddf4bbc5d3917e9383c before b4885bd5935bb26f0a414ad55679a372e53f9b9b (git)
  • 53e83828d352304fec5e19751f38ed8c65e6ec2f (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/smb/client/smb2misc.c
Default Status
affected
Versions
Affected
  • 5.7
Unaffected
  • From 0 before 5.7 (semver)
  • From 5.10.237 through 5.10.* (semver)
  • From 5.15.181 through 5.15.* (semver)
  • From 6.1.135 through 6.1.* (semver)
  • From 6.6.88 through 6.6.* (semver)
  • From 6.12.24 through 6.12.* (semver)
  • From 6.13.12 through 6.13.* (semver)
  • From 6.14.3 through 6.14.* (semver)
  • From 6.15 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/ba3ce6c60cd5db258687dfeba9fc608f5e7cadf3
N/A
https://git.kernel.org/stable/c/9c9000cb91b986eb7f75835340c67857ab97c09b
N/A
https://git.kernel.org/stable/c/b2a1833e1c63e2585867ebeaf4dd41494dcede4b
N/A
https://git.kernel.org/stable/c/864ba5c651b03830f36f0906c21af05b15c1aaa6
N/A
https://git.kernel.org/stable/c/e0717385f5c51e290c2cd2ad4699a778316b5132
N/A
https://git.kernel.org/stable/c/20048e658652e731f5cadf4a695925e570ca0ff9
N/A
https://git.kernel.org/stable/c/6c14ee6af8f1f188b668afd6d003f7516a507b08
N/A
https://git.kernel.org/stable/c/b4885bd5935bb26f0a414ad55679a372e53f9b9b
N/A
Hyperlink: https://git.kernel.org/stable/c/ba3ce6c60cd5db258687dfeba9fc608f5e7cadf3
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/9c9000cb91b986eb7f75835340c67857ab97c09b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b2a1833e1c63e2585867ebeaf4dd41494dcede4b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/864ba5c651b03830f36f0906c21af05b15c1aaa6
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e0717385f5c51e290c2cd2ad4699a778316b5132
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/20048e658652e731f5cadf4a695925e570ca0ff9
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6c14ee6af8f1f188b668afd6d003f7516a507b08
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b4885bd5935bb26f0a414ad55679a372e53f9b9b
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
N/A
https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
Resource: N/A
Details not found