5.5 CVE-2025-37836

Enriched by CISA Patch
 

In the Linux kernel, the following vulnerability has been resolved: PCI: Fix reference leak in pci_register_host_bridge() If device_register() fails, call put_device() to give up the reference to avoid a memory leak, per the comment at device_register(). Found by code review. [bhelgaas: squash Dan Carpenter's double free fix from https://lore.kernel.org/r/db806a6c-a91b-4e5a-a84b-6b7e01bdac85@stanley.mountain]
https://nvd.nist.gov/vuln/detail/CVE-2025-37836

Categories

CWE-NVD-Other

References


 

AFFECTED (from MITRE)


Vendor Product Versions
Linux Linux
  • 37d6a0a6f4700ad3ae7bbf8db38b4557e97b3fe4 < f4db1b2c9ae3d013733c302ee70cac943b7070c0 [affected]
  • 37d6a0a6f4700ad3ae7bbf8db38b4557e97b3fe4 < 3297497ad2246eb9243849bfbbc57a0dea97d76e [affected]
  • 37d6a0a6f4700ad3ae7bbf8db38b4557e97b3fe4 < b783478e0c53ffb4f04f25fb4e21ef7f482b05df [affected]
  • 37d6a0a6f4700ad3ae7bbf8db38b4557e97b3fe4 < bd2a352a0d72575f1842d28c14c10089f0cfe1ae [affected]
  • 37d6a0a6f4700ad3ae7bbf8db38b4557e97b3fe4 < 9707d0c932f41006a2701afc926b232b50e356b4 [affected]
  • 37d6a0a6f4700ad3ae7bbf8db38b4557e97b3fe4 < bbba4c50a2d2a1d3f3bf31cc4b8280cb492bf2c7 [affected]
  • 37d6a0a6f4700ad3ae7bbf8db38b4557e97b3fe4 < f9208aec86226524ec1cb68a09ac70e974ea6536 [affected]
  • 37d6a0a6f4700ad3ae7bbf8db38b4557e97b3fe4 < 804443c1f27883926de94c849d91f5b7d7d696e9 [affected]
Linux Linux
  • 4.10 [affected]
  • < 4.10 [unaffected]
  • 5.10.237 ≤ 5.10.* [unaffected]
  • 5.15.181 ≤ 5.15.* [unaffected]
  • 6.1.136 ≤ 6.1.* [unaffected]
  • 6.6.89 ≤ 6.6.* [unaffected]
  • 6.12.24 ≤ 6.12.* [unaffected]
  • 6.13.12 ≤ 6.13.* [unaffected]
  • 6.14.3 ≤ 6.14.* [unaffected]
  • 6.15 ≤ * [unaffected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end
Configuration 1
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 4.10 < 5.10.237
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 5.11 < 5.15.181
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 5.16 < 6.1.136
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 6.2 < 6.6.89
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 6.7 < 6.12.24
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 6.13 < 6.13.12
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 6.14 < 6.14.3
Configuration 2
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*


REMEDIATION


Patch

Url
https://git.kernel.org/stable/c/3297497ad2246eb9243849bfbbc57a0dea97d76e
https://git.kernel.org/stable/c/804443c1f27883926de94c849d91f5b7d7d696e9
https://git.kernel.org/stable/c/9707d0c932f41006a2701afc926b232b50e356b4
https://git.kernel.org/stable/c/b783478e0c53ffb4f04f25fb4e21ef7f482b05df
https://git.kernel.org/stable/c/bbba4c50a2d2a1d3f3bf31cc4b8280cb492bf2c7
https://git.kernel.org/stable/c/bd2a352a0d72575f1842d28c14c10089f0cfe1ae
https://git.kernel.org/stable/c/f4db1b2c9ae3d013733c302ee70cac943b7070c0
https://git.kernel.org/stable/c/f9208aec86226524ec1cb68a09ac70e974ea6536


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry