{"vulnerability": "CVE-2025-37892", "sightings": [{"uuid": "bd49b49c-b65d-4256-aed7-6bd10a452617", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37892", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16967", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37892\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: inftlcore: Add error check for inftl_read_oob()\n\nIn INFTL_findwriteunit(), the return value of inftl_read_oob()\nneed to be checked. A proper implementation can be\nfound in INFTL_deleteblock(). The status will be set as\nSECTOR_IGNORE to break from the while-loop correctly\nif the inftl_read_oob() fails.\n\ud83d\udccf Published: 2025-05-20T11:00:26.977Z\n\ud83d\udccf Modified: 2025-05-20T11:00:26.977Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/b828d394308e8e00df0a6f57e7dabae609bb8b7b\n2. https://git.kernel.org/stable/c/0300e751170cf80c05ca1a762a7b449e8ca6b693\n3. https://git.kernel.org/stable/c/e7d6ceff95c55297f0ee8f9dbc4da5c558f30e9e\n4. https://git.kernel.org/stable/c/6af3b92b1c0b58ca281d0e1501bad2567f73c1a5\n5. https://git.kernel.org/stable/c/7772621041ee78823ccc5f1fe38f6faa22af7023\n6. https://git.kernel.org/stable/c/5479a6af3c96f73bec2d2819532b6d6814f52dd6\n7. https://git.kernel.org/stable/c/1c22356dfb041e5292835c9ff44d5f91bef8dd18\n8. https://git.kernel.org/stable/c/114d94f095aa405fa9a51484c4be34846d7bb386\n9. https://git.kernel.org/stable/c/d027951dc85cb2e15924c980dc22a6754d100c7c", "creation_timestamp": "2025-05-20T11:40:20.000000Z"}]}