We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-22054

arcnet: Add NULL check in com20020pci_probe()



Description

In the Linux kernel, the following vulnerability has been resolved: arcnet: Add NULL check in com20020pci_probe() devm_kasprintf() returns NULL when memory allocation fails. Currently, com20020pci_probe() does not check for this case, which results in a NULL pointer dereference. Add NULL check after devm_kasprintf() to prevent this issue and ensure no resources are left allocated.

Reserved 2024-12-29 | Published 2025-04-16 | Updated 2025-05-26 | Assigner Linux

Product status

Default status
unaffected

e38cd53421ed4e37fc99662a0f2a0c567993844f before 661cf5d102949898c931e81fd4e1c773afcdeafa
affected

d54f5a5bc85afd01b0a00689b795e31db54adc15 before 905a34dc1ad9a53a8aaaf8a759ea5dbaaa30418d
affected

75c53a4c43295fb8b09edae45239790db9cc69c3 before ef8b29398ea6061ac8257f3e45c9be45cc004ce2
affected

8d034da82563a526dbd7e9069bb3f6946403b72c before be8a0decd0b59a52a07276f9ef3b33ef820b2179
affected

5106d7adb74bc6160806b45ffd2321b10ca14ee0 before ececf8eff6c25acc239fa8f0fd837c76bc770547
affected

6b17a597fc2f13aaaa0a2780eb7edb9ae7ac9aea before ebebeb58d48e25525fa654f2c53a24713fe141c3
affected

6b17a597fc2f13aaaa0a2780eb7edb9ae7ac9aea before a654f31b33515d39bb56c75fd8b26bef025ced7e
affected

6b17a597fc2f13aaaa0a2780eb7edb9ae7ac9aea before 887226163504494ea7e58033a97c2d2ab12e05d4
affected

6b17a597fc2f13aaaa0a2780eb7edb9ae7ac9aea before fda8c491db2a90ff3e6fbbae58e495b4ddddeca3
affected

2e4ad90b15a7341c2d96d2dc6df6d135d72256b6
affected

Default status
affected

6.7
affected

Any version before 6.7
unaffected

5.4.292
unaffected

5.10.236
unaffected

5.15.180
unaffected

6.1.134
unaffected

6.6.87
unaffected

6.12.23
unaffected

6.13.11
unaffected

6.14.2
unaffected

6.15
unaffected

References

git.kernel.org/...c/661cf5d102949898c931e81fd4e1c773afcdeafa

git.kernel.org/...c/905a34dc1ad9a53a8aaaf8a759ea5dbaaa30418d

git.kernel.org/...c/ef8b29398ea6061ac8257f3e45c9be45cc004ce2

git.kernel.org/...c/be8a0decd0b59a52a07276f9ef3b33ef820b2179

git.kernel.org/...c/ececf8eff6c25acc239fa8f0fd837c76bc770547

git.kernel.org/...c/ebebeb58d48e25525fa654f2c53a24713fe141c3

git.kernel.org/...c/a654f31b33515d39bb56c75fd8b26bef025ced7e

git.kernel.org/...c/887226163504494ea7e58033a97c2d2ab12e05d4

git.kernel.org/...c/fda8c491db2a90ff3e6fbbae58e495b4ddddeca3

cve.org (CVE-2025-22054)

nvd.nist.gov (CVE-2025-22054)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-22054

Support options

Helpdesk Chat, Email, Knowledgebase