CVE-2025-38533

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38533
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38533.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38533
Downstream
Related
Published
2025-08-16T11:12:25.978Z
Modified
2025-11-28T02:34:55.374054Z
Summary
net: libwx: fix the using of Rx buffer DMA
Details

In the Linux kernel, the following vulnerability has been resolved:

net: libwx: fix the using of Rx buffer DMA

The wxrxbuffer structure contained two DMA address fields: 'dma' and 'pagedma'. However, only 'pagedma' was actually initialized and used to program the Rx descriptor. But 'dma' was uninitialized and used in some paths.

This could lead to undefined behavior, including DMA errors or use-after-free, if the uninitialized 'dma' was used. Althrough such error has not yet occurred, it is worth fixing in the code.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38533.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3c47e8ae113a68da47987750d9896e325d0aeedd
Fixed
027701180a7bcb64c42eab291133ef0c87b5b6c5
Fixed
ba7c793f96c1c2b944bb6f423d7243f3afc30fe9
Fixed
05c37b574997892a40a0e9b9b88a481566b2367d
Fixed
5fd77cc6bd9b368431a815a780e407b7781bcca0

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.3.0
Fixed
6.6.100
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.40
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.15.8