In the Linux kernel, the following vulnerability has been resolved:
net: libwx: fix the using of Rx buffer DMA
The wx_rx_buffer structure contained two DMA address fields: 'dma' and
'page_dma'. However, only 'page_dma' was actually initialized and used
to program the Rx descriptor. But 'dma' was uninitialized and used in
some paths.
This could lead to undefined behavior, including DMA errors or
use-after-free, if the uninitialized 'dma' was used. Althrough such
error has not yet occurred, it is worth fixing in the code.
References
Configurations
Configuration 1 (hide)
|
History
18 Nov 2025, 18:17
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-787 | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:* |
|
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| References | () https://git.kernel.org/stable/c/027701180a7bcb64c42eab291133ef0c87b5b6c5 - Patch | |
| References | () https://git.kernel.org/stable/c/05c37b574997892a40a0e9b9b88a481566b2367d - Patch | |
| References | () https://git.kernel.org/stable/c/5fd77cc6bd9b368431a815a780e407b7781bcca0 - Patch | |
| References | () https://git.kernel.org/stable/c/ba7c793f96c1c2b944bb6f423d7243f3afc30fe9 - Patch |
18 Aug 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
16 Aug 2025, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-16 12:15
Updated : 2025-11-18 18:17
NVD link : CVE-2025-38533
Mitre link : CVE-2025-38533
CVE.ORG link : CVE-2025-38533
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write
