Логотип exploitDog
bind: "CVE-2025-38111"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2025-38111"

Количество 33

Количество 33

ubuntu логотип

CVE-2025-38111

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define, but it is possible to pass higher value than that via ioctl. While read/write operation should generally fail in this case, mdiobus provides stats array, where wrong address may allow out-of-bounds read/write. Fix that by adding address verification before read/write operation. While this excludes this access from any statistics, it improves security of read/write operation.

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2025-38111

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define, but it is possible to pass higher value than that via ioctl. While read/write operation should generally fail in this case, mdiobus provides stats array, where wrong address may allow out-of-bounds read/write. Fix that by adding address verification before read/write operation. While this excludes this access from any statistics, it improves security of read/write operation.

CVSS3: 6
EPSS: Низкий
nvd логотип

CVE-2025-38111

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define, but it is possible to pass higher value than that via ioctl. While read/write operation should generally fail in this case, mdiobus provides stats array, where wrong address may allow out-of-bounds read/write. Fix that by adding address verification before read/write operation. While this excludes this access from any statistics, it improves security of read/write operation.

CVSS3: 7.1
EPSS: Низкий
msrc логотип

CVE-2025-38111

8 месяцев назад

net/mdiobus: Fix potential out-of-bounds read/write access

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2025-38111

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: n ...

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-vhm6-v69m-pxx6

9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define, but it is possible to pass higher value than that via ioctl. While read/write operation should generally fail in this case, mdiobus provides stats array, where wrong address may allow out-of-bounds read/write. Fix that by adding address verification before read/write operation. While this excludes this access from any statistics, it improves security of read/write operation.

CVSS3: 7.1
EPSS: Низкий
fstec логотип

BDU:2025-10777

9 месяцев назад

Уязвимость компонента mdiobus ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код

CVSS3: 8
EPSS: Низкий
redos логотип

ROS-20260304-73-0005

23 дня назад

Уязвимость kernel-lt

CVSS3: 8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0566-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0542-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0565-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0539-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0535-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0528-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0526-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0560-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0554-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0548-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0543-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0487-1

около 1 месяца назад

Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-38111

In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define, but it is possible to pass higher value than that via ioctl. While read/write operation should generally fail in this case, mdiobus provides stats array, where wrong address may allow out-of-bounds read/write. Fix that by adding address verification before read/write operation. While this excludes this access from any statistics, it improves security of read/write operation.

CVSS3: 7.1
0%
Низкий
9 месяцев назад
redhat логотип
CVE-2025-38111

In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define, but it is possible to pass higher value than that via ioctl. While read/write operation should generally fail in this case, mdiobus provides stats array, where wrong address may allow out-of-bounds read/write. Fix that by adding address verification before read/write operation. While this excludes this access from any statistics, it improves security of read/write operation.

CVSS3: 6
0%
Низкий
9 месяцев назад
nvd логотип
CVE-2025-38111

In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define, but it is possible to pass higher value than that via ioctl. While read/write operation should generally fail in this case, mdiobus provides stats array, where wrong address may allow out-of-bounds read/write. Fix that by adding address verification before read/write operation. While this excludes this access from any statistics, it improves security of read/write operation.

CVSS3: 7.1
0%
Низкий
9 месяцев назад
msrc логотип
CVE-2025-38111

net/mdiobus: Fix potential out-of-bounds read/write access

CVSS3: 7.1
0%
Низкий
8 месяцев назад
debian логотип
CVE-2025-38111

In the Linux kernel, the following vulnerability has been resolved: n ...

CVSS3: 7.1
0%
Низкий
9 месяцев назад
github логотип
GHSA-vhm6-v69m-pxx6

In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define, but it is possible to pass higher value than that via ioctl. While read/write operation should generally fail in this case, mdiobus provides stats array, where wrong address may allow out-of-bounds read/write. Fix that by adding address verification before read/write operation. While this excludes this access from any statistics, it improves security of read/write operation.

CVSS3: 7.1
0%
Низкий
9 месяцев назад
fstec логотип
BDU:2025-10777

Уязвимость компонента mdiobus ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код

CVSS3: 8
0%
Низкий
9 месяцев назад
redos логотип
ROS-20260304-73-0005

Уязвимость kernel-lt

CVSS3: 8
0%
Низкий
23 дня назад
suse-cvrf логотип
SUSE-SU-2026:0566-1

Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0542-1

Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0565-1

Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0539-1

Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0535-1

Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0528-1

Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0526-1

Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0560-1

Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0554-1

Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0548-1

Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0543-1

Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0487-1

Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7)

около 1 месяца назад

Уязвимостей на страницу