In the Linux kernel, the following vulnerability has been resolved:
net/mdiobus: Fix potential out-of-bounds read/write access
When using publicly available tools like 'mdio-tools' to read/write data
from/to network interface and its PHY via mdiobus, there is no verification of
parameters passed to the ioctl and it accepts any mdio address.
Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define,
but it is possible to pass higher value than that via ioctl.
While read/write operation should generally fail in this case,
mdiobus provides stats array, where wrong address may allow out-of-bounds
read/write.
Fix that by adding address verification before read/write operation.
While this excludes this access from any statistics, it improves security of
read/write operation.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
16 Dec 2025, 16:54
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/014ad9210373d2104f6ef10e6bb999a7a0a4c50e - Patch | |
| References | () https://git.kernel.org/stable/c/049af7ac45a6b407748ee0995278fd861e36df8f - Patch | |
| References | () https://git.kernel.org/stable/c/0e629694126ca388916f059453a1c36adde219c4 - Patch | |
| References | () https://git.kernel.org/stable/c/19c5875e26c4ed5686d82a7d8f7051385461b9eb - Patch | |
| References | () https://git.kernel.org/stable/c/73d478234a619f3476028cb02dee699c30ae8262 - Patch | |
| References | () https://git.kernel.org/stable/c/b02d9d2732483e670bc34cb233d28e1d43b15da4 - Patch | |
| References | () https://git.kernel.org/stable/c/bab6bca0834cbb5be2a7cfe59ec6ad016ec72608 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| CWE | CWE-125 |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
03 Jul 2025, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-03 09:15
Updated : 2025-12-16 16:54
NVD link : CVE-2025-38111
Mitre link : CVE-2025-38111
CVE.ORG link : CVE-2025-38111
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
