Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2025-37794 |
CWE-ID | CWE-476 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU108289
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37794
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ieee80211_do_stop() function in net/mac80211/iface.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 6.6 - 6.6.87
CPE2.3https://git.kernel.org/stable/c/305741e7e63234cbcf9b5c4e6aeca25ba0834be8
https://git.kernel.org/stable/c/378677eb8f44621ecc9ce659f7af61e5baa94d81
https://git.kernel.org/stable/c/5f6863dc407f25fcf23fc857f9ac51756a09ea2c
https://git.kernel.org/stable/c/8bc34db7f771a464ff8f686b6f8d4e04963fec27
https://git.kernel.org/stable/c/929ec2c9ad34248ef625e137b6118b6e965797d9
https://git.kernel.org/stable/c/a8df245b5b29f6de98d016dc18e2bb35ec70b0cb
https://git.kernel.org/stable/c/a932a5ce4eee0cbad20220f950fe7bd3534bcbc9
https://git.kernel.org/stable/c/c74b84544dee27298a71715b3ce2c40d372b5a23
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.88
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.