CVE-2025-22054
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
16/04/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
arcnet: Add NULL check in com20020pci_probe()<br />
<br />
devm_kasprintf() returns NULL when memory allocation fails. Currently,<br />
com20020pci_probe() does not check for this case, which results in a<br />
NULL pointer dereference.<br />
<br />
Add NULL check after devm_kasprintf() to prevent this issue and ensure<br />
no resources are left allocated.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.302 (including) | 4.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.264 (including) | 5.4.292 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.204 (including) | 5.10.236 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.143 (including) | 5.15.180 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.68 (including) | 6.1.134 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.7 (including) | 6.6.87 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.23 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.14 (including) | 6.14.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/661cf5d102949898c931e81fd4e1c773afcdeafa
- https://git.kernel.org/stable/c/887226163504494ea7e58033a97c2d2ab12e05d4
- https://git.kernel.org/stable/c/905a34dc1ad9a53a8aaaf8a759ea5dbaaa30418d
- https://git.kernel.org/stable/c/a654f31b33515d39bb56c75fd8b26bef025ced7e
- https://git.kernel.org/stable/c/be8a0decd0b59a52a07276f9ef3b33ef820b2179
- https://git.kernel.org/stable/c/ebebeb58d48e25525fa654f2c53a24713fe141c3
- https://git.kernel.org/stable/c/ececf8eff6c25acc239fa8f0fd837c76bc770547
- https://git.kernel.org/stable/c/ef8b29398ea6061ac8257f3e45c9be45cc004ce2
- https://git.kernel.org/stable/c/fda8c491db2a90ff3e6fbbae58e495b4ddddeca3
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



