CVE-2025-38111
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
03/07/2025
Last modified:
16/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/mdiobus: Fix potential out-of-bounds read/write access<br />
<br />
When using publicly available tools like &#39;mdio-tools&#39; to read/write data<br />
from/to network interface and its PHY via mdiobus, there is no verification of<br />
parameters passed to the ioctl and it accepts any mdio address.<br />
Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define,<br />
but it is possible to pass higher value than that via ioctl.<br />
While read/write operation should generally fail in this case,<br />
mdiobus provides stats array, where wrong address may allow out-of-bounds<br />
read/write.<br />
<br />
Fix that by adding address verification before read/write operation.<br />
While this excludes this access from any statistics, it improves security of<br />
read/write operation.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.6 (including) | 5.10.239 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.186 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.142 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.94 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.34 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/014ad9210373d2104f6ef10e6bb999a7a0a4c50e
- https://git.kernel.org/stable/c/049af7ac45a6b407748ee0995278fd861e36df8f
- https://git.kernel.org/stable/c/0e629694126ca388916f059453a1c36adde219c4
- https://git.kernel.org/stable/c/19c5875e26c4ed5686d82a7d8f7051385461b9eb
- https://git.kernel.org/stable/c/73d478234a619f3476028cb02dee699c30ae8262
- https://git.kernel.org/stable/c/b02d9d2732483e670bc34cb233d28e1d43b15da4
- https://git.kernel.org/stable/c/bab6bca0834cbb5be2a7cfe59ec6ad016ec72608
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



