CVE-2025-37862

In the Linux kernel, the following vulnerability has been resolved: HID: pidff: Fix null pointer dereference in pidff_find_fields This function triggered a null pointer dereference if used to search for a report that isn't implemented on the device. This happened both for optional and required reports alike. The same logic was applied to pidff_find_special_field and although pidff_init_fields should return an error earlier if one of the required reports is missing, future modifications could change this logic and resurface this possible null pointer dereference again. LKML bug report: https://lore.kernel.org/all/CAL-gK7f5=R0nrrQdPtaZZr1fd-cdAMbDMuZ_NLA8vM0SX+nGSw@mail.gmail.com
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

12 Nov 2025, 20:13

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/22a05462c3d0eee15154faf8d13c49e6295270a5 - () https://git.kernel.org/stable/c/22a05462c3d0eee15154faf8d13c49e6295270a5 - Patch
References () https://git.kernel.org/stable/c/3a507184f9307e19cb441b897c49e7843c94e56b - () https://git.kernel.org/stable/c/3a507184f9307e19cb441b897c49e7843c94e56b - Patch
References () https://git.kernel.org/stable/c/44a1b8b2027afbb37e418993fb23561bdb9efb38 - () https://git.kernel.org/stable/c/44a1b8b2027afbb37e418993fb23561bdb9efb38 - Patch
References () https://git.kernel.org/stable/c/6b4449e4f03326fbd2136e67bfcc1e6ffe61541d - () https://git.kernel.org/stable/c/6b4449e4f03326fbd2136e67bfcc1e6ffe61541d - Patch
References () https://git.kernel.org/stable/c/be706a48bb7896d4130edc82811233d1d62158e7 - () https://git.kernel.org/stable/c/be706a48bb7896d4130edc82811233d1d62158e7 - Patch
References () https://git.kernel.org/stable/c/d230becb9d38b7325c5c38d051693e4c26b1829b - () https://git.kernel.org/stable/c/d230becb9d38b7325c5c38d051693e4c26b1829b - Patch
References () https://git.kernel.org/stable/c/ddb147885225d768025f6818df533d30edf3e102 - () https://git.kernel.org/stable/c/ddb147885225d768025f6818df533d30edf3e102 - Patch
References () https://git.kernel.org/stable/c/e368698da79af821f18c099520deab1219c2044b - () https://git.kernel.org/stable/c/e368698da79af821f18c099520deab1219c2044b - Patch
References () https://git.kernel.org/stable/c/f8f4d77710e1c38f4a2bd26c88c4878b5b5e817a - () https://git.kernel.org/stable/c/f8f4d77710e1c38f4a2bd26c88c4878b5b5e817a - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List, Third Party Advisory
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
First Time Linux linux Kernel
Debian
Debian debian Linux
Linux

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html -
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

Information

Published : 2025-05-09 07:16

Updated : 2025-11-12 20:13


NVD link : CVE-2025-37862

Mitre link : CVE-2025-37862

CVE.ORG link : CVE-2025-37862


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-476

NULL Pointer Dereference