CVE-2025-38086
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
28/06/2025
Última modificación:
28/06/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: ch9200: fix uninitialised access during mii_nway_restart<br />
<br />
In mii_nway_restart() the code attempts to call<br />
mii->mdio_read which is ch9200_mdio_read(). ch9200_mdio_read()<br />
utilises a local buffer called "buff", which is initialised<br />
with control_read(). However "buff" is conditionally<br />
initialised inside control_read():<br />
<br />
if (err == size) {<br />
memcpy(data, buf, size);<br />
}<br />
<br />
If the condition of "err == size" is not met, then<br />
"buff" remains uninitialised. Once this happens the<br />
uninitialised "buff" is accessed and returned during<br />
ch9200_mdio_read():<br />
<br />
return (buff[0] | buff[1]
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/119766de4930ff40db9f36b960cb53b0c400e81b
- https://git.kernel.org/stable/c/33163c68d2e3061fa3935b5f0a1867958b1cdbd2
- https://git.kernel.org/stable/c/4da7fcc098218ff92b2e83a43f545c02f714cedd
- https://git.kernel.org/stable/c/6bd2569d0b2f918e9581f744df0263caf73ee76c
- https://git.kernel.org/stable/c/9a350f30d65197354706b7759b5c89d6c267b1a9
- https://git.kernel.org/stable/c/9ad0452c0277b816a435433cca601304cfac7c21
- https://git.kernel.org/stable/c/9da3e442714f7f4393ff01c265c4959c03e88c2f
- https://git.kernel.org/stable/c/cdaa6d1cb2ff1219c6c822b27655dd170ffb0f72