-
CVE-2025-39897
- EPSS 0.02%
- Published 01.10.2025 08:15:32
- Last modified 02.10.2025 19:12:17
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval Add proper error checking for dmaengine_desc_get_metadata_ptr() which can return an error pointer and lead to potential crashes or undefined behaviour if the pointer retrieval fails. Properly handle the error by unmapping DMA buffer, freeing the skb and returning early to prevent further processing with invalid data.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
d0ecda6fdd840b406df6617b003b036f65dd8926
Version
6a91b846af85a24241decd686269e8e038eb13d1
Status
affected
Version <
92e2fc92bc4eb2bc0e84404316fbc02ddd0a3196
Version
6a91b846af85a24241decd686269e8e038eb13d1
Status
affected
Version <
8bbceba7dc5090c00105e006ce28d1292cfda8dd
Version
6a91b846af85a24241decd686269e8e038eb13d1
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.8
Status
affected
Version <
6.8
Version
0
Status
unaffected
Version <=
6.12.*
Version
6.12.46
Status
unaffected
Version <=
6.16.*
Version
6.16.6
Status
unaffected
Version <=
*
Version
6.17
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.044 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|