๐Ÿ” CVE Alert

CVE-2025-39920

UNKNOWN 0.0

pcmcia: Add error handling for add_interval() in do_validate_mem()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
1th

In the Linux kernel, the following vulnerability has been resolved: pcmcia: Add error handling for add_interval() in do_validate_mem() In the do_validate_mem(), the call to add_interval() does not handle errors. If kmalloc() fails in add_interval(), it could result in a null pointer being inserted into the linked list, leading to illegal memory access when sub_interval() is called next. This patch adds an error handling for the add_interval(). If add_interval() returns an error, the function will return early with the error code.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
7b4884ca8853a638df0eb5d251d80d67777b8b1a < 5b60ed401b47897352c520bc724c85aa908dedcc 7b4884ca8853a638df0eb5d251d80d67777b8b1a < ae184024ef31423e5beb44cf4f52999bbcf2fe5b 7b4884ca8853a638df0eb5d251d80d67777b8b1a < 85be7ef8c8e792a414940a38d94565dd48d2f236 7b4884ca8853a638df0eb5d251d80d67777b8b1a < 06b26e3099207c94b3d1be8565aedc6edc4f0a60 7b4884ca8853a638df0eb5d251d80d67777b8b1a < 8699358b6ac99b8ccc97ed9e6e3669ef8958ef7b 7b4884ca8853a638df0eb5d251d80d67777b8b1a < 289b58f8ff3198d091074a751d6b8f6827726f3e 7b4884ca8853a638df0eb5d251d80d67777b8b1a < 369bf6e241506583f4ee7593c53b92e5a9f271b4 7b4884ca8853a638df0eb5d251d80d67777b8b1a < 4a81f78caa53e0633cf311ca1526377d9bff7479
Linux / Linux
2.6.34

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/5b60ed401b47897352c520bc724c85aa908dedcc git.kernel.org: https://git.kernel.org/stable/c/ae184024ef31423e5beb44cf4f52999bbcf2fe5b git.kernel.org: https://git.kernel.org/stable/c/85be7ef8c8e792a414940a38d94565dd48d2f236 git.kernel.org: https://git.kernel.org/stable/c/06b26e3099207c94b3d1be8565aedc6edc4f0a60 git.kernel.org: https://git.kernel.org/stable/c/8699358b6ac99b8ccc97ed9e6e3669ef8958ef7b git.kernel.org: https://git.kernel.org/stable/c/289b58f8ff3198d091074a751d6b8f6827726f3e git.kernel.org: https://git.kernel.org/stable/c/369bf6e241506583f4ee7593c53b92e5a9f271b4 git.kernel.org: https://git.kernel.org/stable/c/4a81f78caa53e0633cf311ca1526377d9bff7479 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html