{"id":"CVE-2025-37841","summary":"pm: cpupower: bench: Prevent NULL dereference on malloc failure","details":"In the Linux kernel, the following vulnerability has been resolved:\n\npm: cpupower: bench: Prevent NULL dereference on malloc failure\n\nIf malloc returns NULL due to low memory, 'config' pointer can be NULL.\nAdd a check to prevent NULL dereference.","modified":"2026-05-18T05:56:17.757756185Z","published":"2025-05-09T06:41:50.684Z","related":["SUSE-SU-2025:01964-1","SUSE-SU-2025:01965-1","SUSE-SU-2025:02000-1","SUSE-SU-2025:02254-1","SUSE-SU-2025:02307-1","SUSE-SU-2025:02333-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:20408-1","SUSE-SU-2025:20413-1","SUSE-SU-2025:20419-1","SUSE-SU-2025:20421-1","SUSE-SU-2026:20555-1","SUSE-SU-2026:20599-1","SUSE-SU-2026:20615-1","openSUSE-SU-2026:20287-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37841.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0e297a02e03dceb2874789ca40bd4e65c5371704"},{"type":"WEB","url":"https://git.kernel.org/stable/c/208baa3ec9043a664d9acfb8174b332e6b17fb69"},{"type":"WEB","url":"https://git.kernel.org/stable/c/34a9394794b0f97af6afedc0c9ee2012c24b28ed"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5e38122aa3fd0f9788186e86a677925bfec0b2d1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/79bded9d70142d2a11d931fc029afece471641db"},{"type":"WEB","url":"https://git.kernel.org/stable/c/87b9f0867c0afa7e892f4b30c36cff6bf2707f85"},{"type":"WEB","url":"https://git.kernel.org/stable/c/942a4b97fc77516678b1d8af1521ff9a94c13b3e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ceec06f464d5cfc0ba966225f7d50506ceb62242"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f8d28fa305b78c5d1073b63f26db265ba8291ae1"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37841.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37841"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7fe2f6399a84760a9af8896ac152728250f82adb"},{"fixed":"34a9394794b0f97af6afedc0c9ee2012c24b28ed"},{"fixed":"79bded9d70142d2a11d931fc029afece471641db"},{"fixed":"0e297a02e03dceb2874789ca40bd4e65c5371704"},{"fixed":"87b9f0867c0afa7e892f4b30c36cff6bf2707f85"},{"fixed":"942a4b97fc77516678b1d8af1521ff9a94c13b3e"},{"fixed":"f8d28fa305b78c5d1073b63f26db265ba8291ae1"},{"fixed":"ceec06f464d5cfc0ba966225f7d50506ceb62242"},{"fixed":"5e38122aa3fd0f9788186e86a677925bfec0b2d1"},{"fixed":"208baa3ec9043a664d9acfb8174b332e6b17fb69"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37841.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.1.0"},{"fixed":"5.4.293"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.237"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.181"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.135"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.88"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.24"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.13.12"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.14.0"},{"fixed":"6.14.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37841.json"}}],"schema_version":"1.7.5"}