CVE-2025-38736

In the Linux kernel, the following vulnerability has been resolved: net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization Syzbot reported shift-out-of-bounds exception on MDIO bus initialization. The PHY address should be masked to 5 bits (0-31). Without this mask, invalid PHY addresses could be used, potentially causing issues with MDIO bus operations. Fix this by masking the PHY address with 0x1f (31 decimal) to ensure it stays within the valid range.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.43:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

08 Jan 2026, 15:34

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE CWE-125
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12.43:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
References () https://git.kernel.org/stable/c/22042ffedd8c2c6db08ccdd6d4273068eddd3c5c - () https://git.kernel.org/stable/c/22042ffedd8c2c6db08ccdd6d4273068eddd3c5c - Patch
References () https://git.kernel.org/stable/c/24ef2f53c07f273bad99173e27ee88d44d135b1c - () https://git.kernel.org/stable/c/24ef2f53c07f273bad99173e27ee88d44d135b1c - Patch
References () https://git.kernel.org/stable/c/523eab02fce458fa6d3c51de5bb055800986953e - () https://git.kernel.org/stable/c/523eab02fce458fa6d3c51de5bb055800986953e - Patch
References () https://git.kernel.org/stable/c/748da80831221ae24b4bc8d7ffb22acd5712a341 - () https://git.kernel.org/stable/c/748da80831221ae24b4bc8d7ffb22acd5712a341 - Patch
References () https://git.kernel.org/stable/c/8f141f2a4f2ef8ca865d5921574c3d6535e00a49 - () https://git.kernel.org/stable/c/8f141f2a4f2ef8ca865d5921574c3d6535e00a49 - Patch
References () https://git.kernel.org/stable/c/fcb4ce9f729c1d08e53abf9d449340e24c3edee6 - () https://git.kernel.org/stable/c/fcb4ce9f729c1d08e53abf9d449340e24c3edee6 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

05 Sep 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-05 18:15

Updated : 2026-01-08 15:34


NVD link : CVE-2025-38736

Mitre link : CVE-2025-38736

CVE.ORG link : CVE-2025-38736


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read