{"vulnerability": "CVE-2025-37826", "sightings": [{"uuid": "2a45e28a-d2b2-4dbc-b64e-af1e6eb20e95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37826", "type": "seen", "source": "https://t.me/cvedetector/24803", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-37826 - Linux Kernel UFS SCSI Null Pointer Dereference Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-37826 \nPublished : May 8, 2025, 7:15 a.m. | 2\u00a0hours, 2\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nscsi: ufs: core: Add NULL check in ufshcd_mcq_compl_pending_transfer()  \n  \nAdd a NULL check for the returned hwq pointer by ufshcd_mcq_req_to_hwq().  \n  \nThis is similar to the fix in commit 74736103fb41 (\"scsi: ufs: core: Fix  \nufshcd_abort_one racing issue\"). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-08T11:45:01.000000Z"}, {"uuid": "6c3d425f-ff56-4d6d-90c2-932016b6d586", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37826", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15484", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37826\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Add NULL check in ufshcd_mcq_compl_pending_transfer()\n\nAdd a NULL check for the returned hwq pointer by ufshcd_mcq_req_to_hwq().\n\nThis is similar to the fix in commit 74736103fb41 (\"scsi: ufs: core: Fix\nufshcd_abort_one racing issue\").\n\ud83d\udccf Published: 2025-05-08T06:26:18.694Z\n\ud83d\udccf Modified: 2025-05-08T06:26:18.694Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/eeab6618037be84e438e9d6ed5d9a53502faf81f\n2. https://git.kernel.org/stable/c/700128d67d57bb1de4251e563ab85202def36c50\n3. https://git.kernel.org/stable/c/08a966a917fe3d92150fa3cc15793ad5e57051eb", "creation_timestamp": "2025-05-08T07:23:09.000000Z"}, {"uuid": "72b9bbb5-4d80-411c-afcc-7f3a1924fe29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37826", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lonebwerh6c2", "content": "", "creation_timestamp": "2025-05-08T07:11:51.179643Z"}, {"uuid": "d28fa0d6-8038-4b94-8ccf-718534080347", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37826", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lonid7trt72z", "content": "", "creation_timestamp": "2025-05-08T08:24:01.112834Z"}, {"uuid": "73be9877-d319-413c-a74b-19ccaeb91ded", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37826", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loniqrcggp22", "content": "", "creation_timestamp": "2025-05-08T08:31:38.087146Z"}]}