First published: Wed Apr 16 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: arcnet: Add NULL check in com20020pci_probe() devm_kasprintf() returns NULL when memory allocation fails. Currently, com20020pci_probe() does not check for this case, which results in a NULL pointer dereference. Add NULL check after devm_kasprintf() to prevent this issue and ensure no resources are left allocated.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=4.19.302<4.20 | |
Linux Kernel | >=5.4.264<5.4.292 | |
Linux Kernel | >=5.10.204<5.10.236 | |
Linux Kernel | >=5.15.143<5.15.180 | |
Linux Kernel | >=6.1.68<6.1.134 | |
Linux Kernel | >=6.6.7<6.6.87 | |
Linux Kernel | >=6.7<6.12.23 | |
Linux Kernel | >=6.13<6.13.11 | |
Linux Kernel | >=6.14<6.14.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22054 is categorized as a high severity vulnerability due to its potential to cause a NULL pointer dereference in the Linux kernel.
To fix CVE-2025-22054, update your Linux kernel to the latest version that contains the patch addressing this vulnerability.
CVE-2025-22054 affects Linux kernel versions between 4.19.302 and 4.20, 5.4.264 and 5.4.292, 5.10.204 and 5.10.236, 5.15.143 and 5.15.180, 6.1.68 and 6.1.134, 6.6.7 and 6.6.87, 6.7 and 6.12.23, 6.13 and 6.13.11, and 6.14 and 6.14.2.
CVE-2025-22054 impacts the arcnet driver in the Linux kernel.
CVE-2025-22054 is not considered remote exploitable as it requires local access to the affected system.