{"uuid": "e57e1881-1c32-40e7-90a5-38ee727d62e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37860", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12407", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37860\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nsfc: fix NULL dereferences in ef100_process_design_param()\n\nSince cited commit, ef100_probe_main() and hence also\n ef100_check_design_params() run before efx-&gt;net_dev is created;\n consequently, we cannot netif_set_tso_max_size() or _segs() at this\n point.\nMove those netif calls to ef100_probe_netdev(), and also replace\n netif_err within the design params code with pci_err.\n\ud83d\udccf Published: 2025-04-18T07:01:28.132Z\n\ud83d\udccf Modified: 2025-04-18T07:01:28.132Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/e56391011381d6d029da377a65ac314cb3d5def2\n2. https://git.kernel.org/stable/c/8241ecec1cdc6699ae197d52d58e76bddd995fa5", "creation_timestamp": "2025-04-18T07:59:23.000000Z"}