PT-2025-22233 · Linux +5 · Linux Kernel +5

Published

2025-04-29

·

Updated

2025-08-28

·

CVE-2025-37972

CVSS v2.0
4.6
VectorAV:L/AC:L/Au:S/C:N/I:N/A:C
Name of the Vulnerable Software and Affected Versions Linux kernel (affected versions not specified)
Description A null pointer dereference issue has been identified in the Linux kernel, specifically in the mtk-pmic-keys input module. The problem occurs when the
regs
parameter is not set in the
mtk pmic keys probe
function, which can happen if the button is not parsed in the device tree. To fix this, the code now uses the
regs
struct, which is defined for all supported platforms. This change ensures that even if the key register is set for a disabled key, the interrupt will not be enabled.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

NULL Pointer Dereference

Weakness Enumeration

Related Identifiers

BDU:2025-12126
CVE-2025-37972
DLA-4271-1
DSA-5925-1
ECHO-208E-D565-28F3
MGASA-2025-0182
MGASA-2025-0183
SUSE-SU-2025:01964-1
SUSE-SU-2025:01965-1
SUSE-SU-2025:02923-1
SUSE-SU-2025_01964-1
SUSE-SU-2025_01965-1
SUSE-SU-2025_02000-1
SUSE-SU-2025_02254-1
SUSE-SU-2025_02307-1
SUSE-SU-2025_02333-1
USN-7699-1
USN-7699-2
USN-7721-1

Affected Products

Astra Linux
Debian
Linuxmint
Linux Kernel
Suse
Ubuntu