First published: Thu May 08 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: driver core: fix potential NULL pointer dereference in dev_uevent() If userspace reads "uevent" device attribute at the same time as another threads unbinds the device from its driver, change to dev->driver from a valid pointer to NULL may result in crash. Fix this by using READ_ONCE() when fetching the pointer, and take bus' drivers klist lock to make sure driver instance will not disappear while we access it. Use WRITE_ONCE() when setting the driver pointer to ensure there is no tearing.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-37800 has been rated as a moderate severity vulnerability due to the potential for a NULL pointer dereference.
To fix CVE-2025-37800, ensure that your Linux kernel is updated to the latest version that includes the patch for this vulnerability.
CVE-2025-37800 affects the Linux Kernel across various distributions that utilize this kernel version.
Yes, CVE-2025-37800 can potentially result in a system crash due to the NULL pointer dereference issue.
CVE-2025-37800 is a vulnerability that can be exploited if not patched, allowing for potential disruption in device handling.