CVE-2025-38645
net/mlx5: Check device memory pointer before usage
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Check device memory pointer before usage Add a NULL check before accessing device memory to prevent a crash if dev->dm allocation in mlx5_init_once() fails.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Aug 22, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
c9b9dcb430b3cd0ad2b04c360c4e528d73430481 < 9053a69abfb5680c2a95292b96df5d204bc0776f c9b9dcb430b3cd0ad2b04c360c4e528d73430481 < eebb225fe6c9103293807b8edabcbad59f9589bc c9b9dcb430b3cd0ad2b04c360c4e528d73430481 < 62d7cf455c887941ed6f105cd430ba04ee0b6c9f c9b9dcb430b3cd0ad2b04c360c4e528d73430481 < 4249f1307932f1b6bbb8b7eba60d82f0b7e44430 c9b9dcb430b3cd0ad2b04c360c4e528d73430481 < 3046b011d368162b1b9ca9453eee0fea930e0a93 c9b9dcb430b3cd0ad2b04c360c4e528d73430481 < da899a1fd7c40e2e4302af1db7d0b8540fb22283 c9b9dcb430b3cd0ad2b04c360c4e528d73430481 < 70f238c902b8c0461ae6fbb8d1a0bbddc4350eea
Linux / Linux
5.4
References
git.kernel.org: https://git.kernel.org/stable/c/9053a69abfb5680c2a95292b96df5d204bc0776f git.kernel.org: https://git.kernel.org/stable/c/eebb225fe6c9103293807b8edabcbad59f9589bc git.kernel.org: https://git.kernel.org/stable/c/62d7cf455c887941ed6f105cd430ba04ee0b6c9f git.kernel.org: https://git.kernel.org/stable/c/4249f1307932f1b6bbb8b7eba60d82f0b7e44430 git.kernel.org: https://git.kernel.org/stable/c/3046b011d368162b1b9ca9453eee0fea930e0a93 git.kernel.org: https://git.kernel.org/stable/c/da899a1fd7c40e2e4302af1db7d0b8540fb22283 git.kernel.org: https://git.kernel.org/stable/c/70f238c902b8c0461ae6fbb8d1a0bbddc4350eea lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html