{"uuid": "6f6dcf79-5d58-46f9-84d3-94c71804eb66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22054", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14806", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22054\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\narcnet: Add NULL check in com20020pci_probe()\n\ndevm_kasprintf() returns NULL when memory allocation fails. Currently,\ncom20020pci_probe() does not check for this case, which results in a\nNULL pointer dereference.\n\nAdd NULL check after devm_kasprintf() to prevent this issue and ensure\nno resources are left allocated.\n\ud83d\udccf Published: 2025-04-16T14:12:11.849Z\n\ud83d\udccf Modified: 2025-05-04T13:06:58.377Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/661cf5d102949898c931e81fd4e1c773afcdeafa\n2. https://git.kernel.org/stable/c/905a34dc1ad9a53a8aaaf8a759ea5dbaaa30418d\n3. https://git.kernel.org/stable/c/ef8b29398ea6061ac8257f3e45c9be45cc004ce2\n4. https://git.kernel.org/stable/c/be8a0decd0b59a52a07276f9ef3b33ef820b2179\n5. https://git.kernel.org/stable/c/ececf8eff6c25acc239fa8f0fd837c76bc770547\n6. https://git.kernel.org/stable/c/ebebeb58d48e25525fa654f2c53a24713fe141c3\n7. https://git.kernel.org/stable/c/a654f31b33515d39bb56c75fd8b26bef025ced7e\n8. https://git.kernel.org/stable/c/887226163504494ea7e58033a97c2d2ab12e05d4\n9. https://git.kernel.org/stable/c/fda8c491db2a90ff3e6fbbae58e495b4ddddeca3", "creation_timestamp": "2025-05-04T13:18:51.000000Z"}