#VU108851 Memory leak in Linux kernel - CVE-2025-37836


| Updated: 2025-05-10

Vulnerability identifier: #VU108851

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37836

CWE-ID: CWE-401

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the pci_register_host_bridge() function in drivers/pci/probe.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: 6.14, 6.14.1, 6.14.2


External links
https://git.kernel.org/stable/c/3297497ad2246eb9243849bfbbc57a0dea97d76e
https://git.kernel.org/stable/c/804443c1f27883926de94c849d91f5b7d7d696e9
https://git.kernel.org/stable/c/9707d0c932f41006a2701afc926b232b50e356b4
https://git.kernel.org/stable/c/b783478e0c53ffb4f04f25fb4e21ef7f482b05df
https://git.kernel.org/stable/c/bbba4c50a2d2a1d3f3bf31cc4b8280cb492bf2c7
https://git.kernel.org/stable/c/bd2a352a0d72575f1842d28c14c10089f0cfe1ae
https://git.kernel.org/stable/c/f4db1b2c9ae3d013733c302ee70cac943b7070c0
https://git.kernel.org/stable/c/f9208aec86226524ec1cb68a09ac70e974ea6536
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.14.3


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability