The Linux kernel vulnerability tracked as CVE-2025-38348 is a small but meaningful buffer‑overflow in the p54 wireless driver (function p54_rx_eeprom_readback()) that can be triggered by a malicious USB device posing as an Intersil p54 Wi‑Fi interface — and while Microsoft’s MSRC entry...
A straightforward but dangerous null-pointer oversight in the Linux kernel’s FPGA test code — tracked as CVE‑2025‑38274 and disclosed in July 2025 — has been patched upstream after maintainers confirmed that the fpga_mgr_test_img_load_sgt() helper can pass a NULL pointer into sg_alloc_table()...
The Linux kernel vulnerability tracked as CVE-2025-38227 — a slab-use-after-free in the media subsystem’s vidtv test driver — is real, it affects mainstream kernel trees and multiple Linux distributions, and Microsoft’s own Linux-based offerings are not necessarily limited to a single affected...
The Linux kernel flaw tracked as CVE‑2025‑38229 — a media‑driver bug in the cxusb DVB adapter code — is real, has been fixed upstream, and Microsoft’s public product mapping names Azure Linux as a confirmed, attested carrier; but that attestation does not prove exclusivity. Azure Linux is the...
A small, surgical kernel fix landed upstream in mid‑2025 to close a robustness hole in ext4 that could produce a NULL-pointer kernel oops and system crash when the filesystem processed certain orphaned symlink inodes; the patch makes ext4 mark folios dirty only for regular files when running in...
The Linux kernel vulnerability tracked as CVE-2025-38219 affects the F2FS (Flash‑Friendly File System) driver and can cause a kernel warning or instability when the filesystem encounters a corrupted image that produces a negative i_nlink value; Microsoft’s public advisory names Azure Linux as a...
The Linux kernel received a targeted fix addressing a subtle but real Time‑of‑Check to Time‑of‑Use (TOCTOU) race in the hwmon driver ftsteutates: the fts_read() path could read a shared fan source index twice without synchronization, opening a narrow window where a concurrent update changes the...
The Linux kernel fix for CVE-2025-38211 closes a subtle but dangerous lifetime-management bug in the RDMA iWCM (InfiniBand/RDMA Connection Management) stack: work objects allocated per cm_id could be used after they were freed, causing kernel memory corruption and deterministic crashes that...
A careless protocol flip inside an eBPF helper can crash a Linux host: CVE-2025-38192 is a kernel networking bug that occurs when a NAT46 BPF program changes an skb's protocol from IPv4 to IPv6 without clearing the associated destination (dst) pointer, producing a NULL pointer dereference and a...
The Linux kernel fix tracked as CVE-2025-38170 addresses a subtle ARM64 context-switch bug in the FPSIMD/SME handling: under certain preemption and trap conditions the kernel could reuse stale floating-point/vector state, triggering unexpected SME traps and kernel warnings. Microsoft’s Security...
A small, two-byte mistake in a Linux Wi‑Fi driver has quietly become a reminder that even trivial-looking changes in kernel code can carry outsized risk: CVE-2025-38159 is an out‑of‑bounds read in the Realtek rtw88 Wi‑Fi driver that was introduced years ago, affects a broad set of devices...
The Linux kernel fix tracked as CVE-2025-38158 addresses a subtle but consequential DMA address assembly bug in the Hisilicon VFIO accelerator driver (hisi_acc_vfio_pci) that can leave guest kernel‑mode encryption services broken after live migration — and Microsoft’s short MSRC attestation that...
The upstream Linux kernel fix for CVE-2025-38153 patches a correctness bug in the AQC111 USB Ethernet driver that failed to validate the byte count returned by usbnet read calls — a small coding lapse with outsized operational implications for any system that actually loads and uses the aqc111...
A subtle lifecycle bug in the Linux kernel’s PHY subsystem — tracked as CVE-2025-38149 — can cause a kernel crash when a network port is disabled and later re-enabled, and operators should treat the issue as an availability-first vulnerability that demands prompt, targeted patching and careful...
The Linux kernel fix tracked as CVE‑2025‑38143 — described as a NULL pointer dereference in the backlight driver (pm8941) where wled_configure() failed to check devm_kasprintf() — is real, patched upstream, and has been mapped by multiple vendors; Microsoft’s Security Response Center (MSRC)...
A small defensive check landed in the upstream Linux kernel in mid‑2025 that closes a straightforward but dangerous NULL‑pointer dereference in the Aspeed LPC snoop helper — a fix that should be treated as a high‑priority stability update for systems that run Aspeed-based SoCs or BMC firmware...
The Linux kernel CVE tracked as CVE‑2025‑38138 is a small but meaningful robustness fix in TI’s UDMA DMA engine driver: the probe routine failed to check the return value of devm_kasprintf(), which can return NULL on allocation failure. Upstream maintainers fixed the bug by inserting a simple...
The short answer: no — Azure Linux is not necessarily the only Microsoft product that could contain the vulnerable Renesas USBHS code, but it is the only Microsoft product Microsoft has publicly attested (so far) to include the specific upstream component that maps to CVE‑2025‑38136. Treat...
The Linux kernel received a targeted, low‑level fix addressing a hang in the UFS (Universal Flash Storage) SCSI error handler — a bug that can cause sustained or persistent loss of availability by deadlocking kernel threads during device error recovery. The change is small and surgical at the...
Microsoft’s advisory on CVE-2025-38112 confirms a race condition in the Linux kernel networking code — a time-of-check to time-of-use (TOCTOU) flaw in sk_is_readable() that can result in a null-pointer dereference — and while Microsoft has publicly attested this vulnerability for its Azure Linux...