{"vulnerability": "CVE-2025-22017", "sightings": [{"uuid": "75cd35d0-27fc-41cb-83c3-ac5469f9a5cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22017", "type": "seen", "source": "https://t.me/cvedetector/22445", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22017 - Linux kernel devlink XA-Alloc Cyclic Off-by-Error\", \n  \"Content\": \"CVE ID : CVE-2025-22017 \nPublished : April 8, 2025, 9:15 a.m. | 2\u00a0hours, 10\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndevlink: fix xa_alloc_cyclic() error handling  \n  \nIn case of returning 1 from xa_alloc_cyclic() (wrapping) ERR_PTR(1) will  \nbe returned, which will cause IS_ERR() to be false. Which can lead to  \ndereference not allocated pointer (rel).  \n  \nFix it by checking if err is lower than zero.  \n  \nThis wasn't found in real usecase, only noticed. Credit to Pierre. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T13:59:55.000000Z"}, {"uuid": "9f6f5ae8-ea69-4b4d-ba81-596ecd42a945", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22017", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10892", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22017\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndevlink: fix xa_alloc_cyclic() error handling\n\nIn case of returning 1 from xa_alloc_cyclic() (wrapping) ERR_PTR(1) will\nbe returned, which will cause IS_ERR() to be false. Which can lead to\ndereference not allocated pointer (rel).\n\nFix it by checking if err is lower than zero.\n\nThis wasn't found in real usecase, only noticed. Credit to Pierre.\n\ud83d\udccf Published: 2025-04-08T08:18:06.575Z\n\ud83d\udccf Modified: 2025-04-08T08:18:06.575Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/f8aaa38cfaf6f20afa4db36b6529032fb69165dc\n2. https://git.kernel.org/stable/c/466132f6d28a7e47a82501fe1c46b8f90487412e\n3. https://git.kernel.org/stable/c/f3b97b7d4bf316c3991e5634c9f4847c2df35478", "creation_timestamp": "2025-04-08T08:47:00.000000Z"}, {"uuid": "ccd416a3-8186-4534-8425-eb83771bb7ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22017", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3lmnyh2gblc2h", "content": "", "creation_timestamp": "2025-04-13T02:22:10.101543Z"}]}