{"uuid": "74cd214f-ecdb-4482-9c9e-ab58ea30d8e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37755", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14269", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37755\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnet: libwx: handle page_pool_dev_alloc_pages error\n\npage_pool_dev_alloc_pages could return NULL. There was a WARN_ON(!page)\nbut it would still proceed to use the NULL pointer and then crash.\n\nThis is similar to commit 001ba0902046\n(\"net: fec: handle page_pool_dev_alloc_pages error\").\n\nThis is found by our static analysis tool KNighter.\n\ud83d\udccf Published: 2025-05-01T12:55:59.499Z\n\ud83d\udccf Modified: 2025-05-01T12:55:59.499Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/c17ef974bfcf1a50818168b47c4606b425a957c4\n2. https://git.kernel.org/stable/c/ad81d666e114ebf989fc9994d4c93d451dc60056\n3. https://git.kernel.org/stable/c/1dd13c60348f515acd8c6f25a561b9c4e3b04fea\n4. https://git.kernel.org/stable/c/90bec7cef8805f9a23145e070dff28a02bb584eb\n5. https://git.kernel.org/stable/c/7f1ff1b38a7c8b872382b796023419d87d78c47e", "creation_timestamp": "2025-05-01T13:14:39.000000Z"}