Количество 33
Количество 33
CVE-2025-38111
In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define, but it is possible to pass higher value than that via ioctl. While read/write operation should generally fail in this case, mdiobus provides stats array, where wrong address may allow out-of-bounds read/write. Fix that by adding address verification before read/write operation. While this excludes this access from any statistics, it improves security of read/write operation.
CVE-2025-38111
In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define, but it is possible to pass higher value than that via ioctl. While read/write operation should generally fail in this case, mdiobus provides stats array, where wrong address may allow out-of-bounds read/write. Fix that by adding address verification before read/write operation. While this excludes this access from any statistics, it improves security of read/write operation.
CVE-2025-38111
In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define, but it is possible to pass higher value than that via ioctl. While read/write operation should generally fail in this case, mdiobus provides stats array, where wrong address may allow out-of-bounds read/write. Fix that by adding address verification before read/write operation. While this excludes this access from any statistics, it improves security of read/write operation.
CVE-2025-38111
net/mdiobus: Fix potential out-of-bounds read/write access
CVE-2025-38111
In the Linux kernel, the following vulnerability has been resolved: n ...
GHSA-vhm6-v69m-pxx6
In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define, but it is possible to pass higher value than that via ioctl. While read/write operation should generally fail in this case, mdiobus provides stats array, where wrong address may allow out-of-bounds read/write. Fix that by adding address verification before read/write operation. While this excludes this access from any statistics, it improves security of read/write operation.
BDU:2025-10777
Уязвимость компонента mdiobus ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
ROS-20260304-73-0005
Уязвимость kernel-lt
SUSE-SU-2026:0566-1
Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:0542-1
Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0565-1
Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:0539-1
Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0535-1
Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0528-1
Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0526-1
Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:0560-1
Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7)
SUSE-SU-2026:0554-1
Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7)
SUSE-SU-2026:0548-1
Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:0543-1
Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:0487-1
Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-38111 In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define, but it is possible to pass higher value than that via ioctl. While read/write operation should generally fail in this case, mdiobus provides stats array, where wrong address may allow out-of-bounds read/write. Fix that by adding address verification before read/write operation. While this excludes this access from any statistics, it improves security of read/write operation. | CVSS3: 7.1 | 0% Низкий | 9 месяцев назад | |
CVE-2025-38111 In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define, but it is possible to pass higher value than that via ioctl. While read/write operation should generally fail in this case, mdiobus provides stats array, where wrong address may allow out-of-bounds read/write. Fix that by adding address verification before read/write operation. While this excludes this access from any statistics, it improves security of read/write operation. | CVSS3: 6 | 0% Низкий | 9 месяцев назад | |
CVE-2025-38111 In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define, but it is possible to pass higher value than that via ioctl. While read/write operation should generally fail in this case, mdiobus provides stats array, where wrong address may allow out-of-bounds read/write. Fix that by adding address verification before read/write operation. While this excludes this access from any statistics, it improves security of read/write operation. | CVSS3: 7.1 | 0% Низкий | 9 месяцев назад | |
CVE-2025-38111 net/mdiobus: Fix potential out-of-bounds read/write access | CVSS3: 7.1 | 0% Низкий | 8 месяцев назад | |
CVE-2025-38111 In the Linux kernel, the following vulnerability has been resolved: n ... | CVSS3: 7.1 | 0% Низкий | 9 месяцев назад | |
GHSA-vhm6-v69m-pxx6 In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define, but it is possible to pass higher value than that via ioctl. While read/write operation should generally fail in this case, mdiobus provides stats array, where wrong address may allow out-of-bounds read/write. Fix that by adding address verification before read/write operation. While this excludes this access from any statistics, it improves security of read/write operation. | CVSS3: 7.1 | 0% Низкий | 9 месяцев назад | |
BDU:2025-10777 Уязвимость компонента mdiobus ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код | CVSS3: 8 | 0% Низкий | 9 месяцев назад | |
ROS-20260304-73-0005 Уязвимость kernel-lt | CVSS3: 8 | 0% Низкий | 22 дня назад | |
SUSE-SU-2026:0566-1 Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4) | около 1 месяца назад | |||
SUSE-SU-2026:0542-1 Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) | около 1 месяца назад | |||
SUSE-SU-2026:0565-1 Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4) | около 1 месяца назад | |||
SUSE-SU-2026:0539-1 Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) | около 1 месяца назад | |||
SUSE-SU-2026:0535-1 Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) | около 1 месяца назад | |||
SUSE-SU-2026:0528-1 Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5) | около 1 месяца назад | |||
SUSE-SU-2026:0526-1 Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4) | около 1 месяца назад | |||
SUSE-SU-2026:0560-1 Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | около 1 месяца назад | |||
SUSE-SU-2026:0554-1 Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | около 1 месяца назад | |||
SUSE-SU-2026:0548-1 Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6) | около 1 месяца назад | |||
SUSE-SU-2026:0543-1 Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6) | около 1 месяца назад | |||
SUSE-SU-2026:0487-1 Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | около 1 месяца назад |
Уязвимостей на страницу