U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-37788 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path In the for loop used to allocate the loc_array and bmap for each port, a memory leak is possible when the allocation for loc_array succeeds, but the allocation for bmap fails. This is because when the control flow goes to the label free_eth_finfo, only the allocations starting from (i-1)th iteration are freed. Fix that by freeing the loc_array in the bmap allocation error path.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/00ffb3724ce743578163f5ade2884374554ca021 kernel.org
https://git.kernel.org/stable/c/08aa59c0be768596467552c129e9f82166779a67 kernel.org
https://git.kernel.org/stable/c/118d05b530343cd9322607b9719405ba254a4183 kernel.org
https://git.kernel.org/stable/c/76deedea08899885f076aba0bb80bd1276446822 kernel.org
https://git.kernel.org/stable/c/dafb6e433ab2333b67be05433dc9c6ccbc7b1284 kernel.org
https://git.kernel.org/stable/c/e9de08e15aee35b96064960f95997bb6c1209c4b kernel.org
https://git.kernel.org/stable/c/fa2d7708955e4f8212fd69bab1da604e60cb0b15 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-37788
NVD Published Date:
05/01/2025
NVD Last Modified:
05/02/2025
Source:
kernel.org