lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025041604-CVE-2025-22054-dc6c@gregkh>
Date: Wed, 16 Apr 2025 16:12:25 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2025-22054: arcnet: Add NULL check in com20020pci_probe()

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

arcnet: Add NULL check in com20020pci_probe()

devm_kasprintf() returns NULL when memory allocation fails. Currently,
com20020pci_probe() does not check for this case, which results in a
NULL pointer dereference.

Add NULL check after devm_kasprintf() to prevent this issue and ensure
no resources are left allocated.

The Linux kernel CVE team has assigned CVE-2025-22054 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 5.4.264 with commit e38cd53421ed4e37fc99662a0f2a0c567993844f and fixed in 5.4.292 with commit 661cf5d102949898c931e81fd4e1c773afcdeafa
	Issue introduced in 5.10.204 with commit d54f5a5bc85afd01b0a00689b795e31db54adc15 and fixed in 5.10.236 with commit 905a34dc1ad9a53a8aaaf8a759ea5dbaaa30418d
	Issue introduced in 5.15.143 with commit 75c53a4c43295fb8b09edae45239790db9cc69c3 and fixed in 5.15.180 with commit ef8b29398ea6061ac8257f3e45c9be45cc004ce2
	Issue introduced in 6.1.68 with commit 8d034da82563a526dbd7e9069bb3f6946403b72c and fixed in 6.1.134 with commit be8a0decd0b59a52a07276f9ef3b33ef820b2179
	Issue introduced in 6.6.7 with commit 5106d7adb74bc6160806b45ffd2321b10ca14ee0 and fixed in 6.6.87 with commit ececf8eff6c25acc239fa8f0fd837c76bc770547
	Issue introduced in 6.7 with commit 6b17a597fc2f13aaaa0a2780eb7edb9ae7ac9aea and fixed in 6.12.23 with commit ebebeb58d48e25525fa654f2c53a24713fe141c3
	Issue introduced in 6.7 with commit 6b17a597fc2f13aaaa0a2780eb7edb9ae7ac9aea and fixed in 6.13.11 with commit a654f31b33515d39bb56c75fd8b26bef025ced7e
	Issue introduced in 6.7 with commit 6b17a597fc2f13aaaa0a2780eb7edb9ae7ac9aea and fixed in 6.14.2 with commit 887226163504494ea7e58033a97c2d2ab12e05d4
	Issue introduced in 6.7 with commit 6b17a597fc2f13aaaa0a2780eb7edb9ae7ac9aea and fixed in 6.15-rc1 with commit fda8c491db2a90ff3e6fbbae58e495b4ddddeca3
	Issue introduced in 4.19.302 with commit 2e4ad90b15a7341c2d96d2dc6df6d135d72256b6

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2025-22054
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/net/arcnet/com20020-pci.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/661cf5d102949898c931e81fd4e1c773afcdeafa
	https://git.kernel.org/stable/c/905a34dc1ad9a53a8aaaf8a759ea5dbaaa30418d
	https://git.kernel.org/stable/c/ef8b29398ea6061ac8257f3e45c9be45cc004ce2
	https://git.kernel.org/stable/c/be8a0decd0b59a52a07276f9ef3b33ef820b2179
	https://git.kernel.org/stable/c/ececf8eff6c25acc239fa8f0fd837c76bc770547
	https://git.kernel.org/stable/c/ebebeb58d48e25525fa654f2c53a24713fe141c3
	https://git.kernel.org/stable/c/a654f31b33515d39bb56c75fd8b26bef025ced7e
	https://git.kernel.org/stable/c/887226163504494ea7e58033a97c2d2ab12e05d4
	https://git.kernel.org/stable/c/fda8c491db2a90ff3e6fbbae58e495b4ddddeca3

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ