๐Ÿ” CVE Alert

CVE-2025-38645

UNKNOWN 0.0

net/mlx5: Check device memory pointer before usage

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Check device memory pointer before usage Add a NULL check before accessing device memory to prevent a crash if dev->dm allocation in mlx5_init_once() fails.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Aug 22, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
c9b9dcb430b3cd0ad2b04c360c4e528d73430481 < 9053a69abfb5680c2a95292b96df5d204bc0776f c9b9dcb430b3cd0ad2b04c360c4e528d73430481 < eebb225fe6c9103293807b8edabcbad59f9589bc c9b9dcb430b3cd0ad2b04c360c4e528d73430481 < 62d7cf455c887941ed6f105cd430ba04ee0b6c9f c9b9dcb430b3cd0ad2b04c360c4e528d73430481 < 4249f1307932f1b6bbb8b7eba60d82f0b7e44430 c9b9dcb430b3cd0ad2b04c360c4e528d73430481 < 3046b011d368162b1b9ca9453eee0fea930e0a93 c9b9dcb430b3cd0ad2b04c360c4e528d73430481 < da899a1fd7c40e2e4302af1db7d0b8540fb22283 c9b9dcb430b3cd0ad2b04c360c4e528d73430481 < 70f238c902b8c0461ae6fbb8d1a0bbddc4350eea
Linux / Linux
5.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/9053a69abfb5680c2a95292b96df5d204bc0776f git.kernel.org: https://git.kernel.org/stable/c/eebb225fe6c9103293807b8edabcbad59f9589bc git.kernel.org: https://git.kernel.org/stable/c/62d7cf455c887941ed6f105cd430ba04ee0b6c9f git.kernel.org: https://git.kernel.org/stable/c/4249f1307932f1b6bbb8b7eba60d82f0b7e44430 git.kernel.org: https://git.kernel.org/stable/c/3046b011d368162b1b9ca9453eee0fea930e0a93 git.kernel.org: https://git.kernel.org/stable/c/da899a1fd7c40e2e4302af1db7d0b8540fb22283 git.kernel.org: https://git.kernel.org/stable/c/70f238c902b8c0461ae6fbb8d1a0bbddc4350eea lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html