-
CVE-2025-38533
- EPSS 0.03%
- Published 16.08.2025 11:12:25
- Last modified 18.08.2025 20:16:28
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: net: libwx: fix the using of Rx buffer DMA The wx_rx_buffer structure contained two DMA address fields: 'dma' and 'page_dma'. However, only 'page_dma' was actually initialized and used to program the Rx descriptor. But 'dma' was uninitialized and used in some paths. This could lead to undefined behavior, including DMA errors or use-after-free, if the uninitialized 'dma' was used. Althrough such error has not yet occurred, it is worth fixing in the code.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
027701180a7bcb64c42eab291133ef0c87b5b6c5
Version
3c47e8ae113a68da47987750d9896e325d0aeedd
Status
affected
Version <
ba7c793f96c1c2b944bb6f423d7243f3afc30fe9
Version
3c47e8ae113a68da47987750d9896e325d0aeedd
Status
affected
Version <
05c37b574997892a40a0e9b9b88a481566b2367d
Version
3c47e8ae113a68da47987750d9896e325d0aeedd
Status
affected
Version <
5fd77cc6bd9b368431a815a780e407b7781bcca0
Version
3c47e8ae113a68da47987750d9896e325d0aeedd
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.3
Status
affected
Version <
6.3
Version
0
Status
unaffected
Version <=
6.6.*
Version
6.6.100
Status
unaffected
Version <=
6.12.*
Version
6.12.40
Status
unaffected
Version <=
6.15.*
Version
6.15.8
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.055 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|