CVE-2025-37832
Linux Debian vulnerability analysis and mitigation

Overview

CVE-2025-37832 is a vulnerability discovered in the Linux kernel's sun50i cpufreq driver that involves an out-of-bounds access issue when handling the nvmem cell. The vulnerability was identified in 2025 and affects systems using the sun50i cpufreq driver (Tenable).

Technical details

The vulnerability occurs due to a mismatch between the Device Tree (DT) specification and the data access method. While the DT specifies the nvmem cell as covering only two bytes, the driver uses a u32 pointer to read four bytes, resulting in an out-of-bounds access. This issue was detected by KASAN (Kernel Address Sanitizer) enabled kernels, which report the out-of-bounds access in the sun50icpufreqnvmem_probe function (Tenable).

Impact

The vulnerability allows for out-of-bounds memory access in the kernel space, which could potentially lead to system instability or crashes. When triggered, the issue can cause kernel panic conditions with the error message 'Non-resumable error' (Tenable).

Mitigation and workarounds

The fix involves modifying the driver to use nvmemcellread() to return the length of the nvmem cell in bytes and implementing proper data handling. The solution includes using memcpy() to copy the information into a zeroed u32 buffer and ensuring the data is always read in little-endian format, as this matches the storage format in the SID efuses (Tenable).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management