CVE-2025-38645

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Check device memory pointer before usage Add a NULL check before accessing device memory to prevent a crash if dev->dm allocation in mlx5_init_once() fails.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

07 Jan 2026, 17:36

Type Values Removed Values Added
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/3046b011d368162b1b9ca9453eee0fea930e0a93 - () https://git.kernel.org/stable/c/3046b011d368162b1b9ca9453eee0fea930e0a93 - Patch
References () https://git.kernel.org/stable/c/4249f1307932f1b6bbb8b7eba60d82f0b7e44430 - () https://git.kernel.org/stable/c/4249f1307932f1b6bbb8b7eba60d82f0b7e44430 - Patch
References () https://git.kernel.org/stable/c/62d7cf455c887941ed6f105cd430ba04ee0b6c9f - () https://git.kernel.org/stable/c/62d7cf455c887941ed6f105cd430ba04ee0b6c9f - Patch
References () https://git.kernel.org/stable/c/70f238c902b8c0461ae6fbb8d1a0bbddc4350eea - () https://git.kernel.org/stable/c/70f238c902b8c0461ae6fbb8d1a0bbddc4350eea - Patch
References () https://git.kernel.org/stable/c/9053a69abfb5680c2a95292b96df5d204bc0776f - () https://git.kernel.org/stable/c/9053a69abfb5680c2a95292b96df5d204bc0776f - Patch
References () https://git.kernel.org/stable/c/da899a1fd7c40e2e4302af1db7d0b8540fb22283 - () https://git.kernel.org/stable/c/da899a1fd7c40e2e4302af1db7d0b8540fb22283 - Patch
References () https://git.kernel.org/stable/c/eebb225fe6c9103293807b8edabcbad59f9589bc - () https://git.kernel.org/stable/c/eebb225fe6c9103293807b8edabcbad59f9589bc - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

28 Aug 2025, 15:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5: Verificar el puntero de memoria del dispositivo antes del uso. Agregar una verificación NULL antes de acceder a la memoria del dispositivo para evitar un bloqueo si falla la asignación dev->dm en mlx5_init_once().
References
  • () https://git.kernel.org/stable/c/9053a69abfb5680c2a95292b96df5d204bc0776f -

22 Aug 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-22 16:15

Updated : 2026-01-07 17:36


NVD link : CVE-2025-38645

Mitre link : CVE-2025-38645

CVE.ORG link : CVE-2025-38645


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference