CVE-2025-38086

MEDIUM

Linux kernel - Memory Corruption

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: net: ch9200: fix uninitialised access during mii_nway_restart In mii_nway_restart() the code attempts to call mii->mdio_read which is ch9200_mdio_read(). ch9200_mdio_read() utilises a local buffer called "buff", which is initialised with control_read(). However "buff" is conditionally initialised inside control_read(): if (err == size) { memcpy(data, buf, size); } If the condition of "err == size" is not met, then "buff" remains uninitialised. Once this happens the uninitialised "buff" is accessed and returned during ch9200_mdio_read(): return (buff[0] | buff[1] << 8); The problem stems from the fact that ch9200_mdio_read() ignores the return value of control_read(), leading to uinit-access of "buff". To fix this we should check the return value of control_read() and return early on error.

Scores

CVSS v3 5.5
EPSS 0.0011
EPSS Percentile 29.1%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-908
Status published
Products (10)
debian/debian_linux 11.0
linux/Kernel 4.3.0 - 5.4.295linux
linux/Kernel 5.11.0 - 5.15.186linux
linux/Kernel 5.16.0 - 6.1.142linux
linux/Kernel 5.5.0 - 5.10.239linux
linux/Kernel 6.13.0 - 6.15.4linux
linux/Kernel 6.2.0 - 6.6.95linux
linux/Kernel 6.7.0 - 6.12.35linux
linux/linux_kernel 4.3 (6 CPE variants)
linux/linux_kernel 4.3.1 - 5.4.295
Published Jun 28, 2025
Tracked Since Feb 18, 2026