CVE-2025-38533

In the Linux kernel, the following vulnerability has been resolved: net: libwx: fix the using of Rx buffer DMA The wx_rx_buffer structure contained two DMA address fields: 'dma' and 'page_dma'. However, only 'page_dma' was actually initialized and used to program the Rx descriptor. But 'dma' was uninitialized and used in some paths. This could lead to undefined behavior, including DMA errors or use-after-free, if the uninitialized 'dma' was used. Althrough such error has not yet occurred, it is worth fixing in the code.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:*

History

18 Nov 2025, 18:17

Type Values Removed Values Added
CWE CWE-787
CPE cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/027701180a7bcb64c42eab291133ef0c87b5b6c5 - () https://git.kernel.org/stable/c/027701180a7bcb64c42eab291133ef0c87b5b6c5 - Patch
References () https://git.kernel.org/stable/c/05c37b574997892a40a0e9b9b88a481566b2367d - () https://git.kernel.org/stable/c/05c37b574997892a40a0e9b9b88a481566b2367d - Patch
References () https://git.kernel.org/stable/c/5fd77cc6bd9b368431a815a780e407b7781bcca0 - () https://git.kernel.org/stable/c/5fd77cc6bd9b368431a815a780e407b7781bcca0 - Patch
References () https://git.kernel.org/stable/c/ba7c793f96c1c2b944bb6f423d7243f3afc30fe9 - () https://git.kernel.org/stable/c/ba7c793f96c1c2b944bb6f423d7243f3afc30fe9 - Patch

18 Aug 2025, 20:16

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: libwx: corrección del uso del DMA del búfer Rx. La estructura wx_rx_buffer contenía dos campos de dirección DMA: 'dma' y 'page_dma'. Sin embargo, solo 'page_dma' se inicializó y se utilizó para programar el descriptor Rx. Sin embargo, 'dma' no se inicializó y se utilizó en algunas rutas. Esto podría provocar un comportamiento indefinido, incluyendo errores de DMA o use after free, si se utilizaba 'dma' sin inicializar. Si bien este error aún no se ha producido, conviene corregirlo en el código.

16 Aug 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-16 12:15

Updated : 2025-11-18 18:17


NVD link : CVE-2025-38533

Mitre link : CVE-2025-38533

CVE.ORG link : CVE-2025-38533


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write