CVE-2025-38086

In the Linux kernel, the following vulnerability has been resolved:

net: ch9200: fix uninitialised access during mii_nway_restart

In mii_nway_restart() the code attempts to call
mii->mdio_read which is ch9200_mdio_read(). ch9200_mdio_read()
utilises a local buffer called "buff", which is initialised
with control_read(). However "buff" is conditionally
initialised inside control_read():

        if (err == size) {
                memcpy(data, buf, size);
        }

If the condition of "err == size" is not met, then
"buff" remains uninitialised. Once this happens the
uninitialised "buff" is accessed and returned during
ch9200_mdio_read():

        return (buff[0] | buff[1] << 8);

The problem stems from the fact that ch9200_mdio_read()
ignores the return value of control_read(), leading to
uinit-access of "buff".

To fix this we should check the return value of
control_read() and return early on error.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
LinuxCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 8%
VendorProductVersion
linuxlinux_kernel
4.3.1 ≤
𝑥
< 5.4.295
linuxlinux_kernel
5.5 ≤
𝑥
< 5.10.239
linuxlinux_kernel
5.11 ≤
𝑥
< 5.15.186
linuxlinux_kernel
5.16 ≤
𝑥
< 6.1.142
linuxlinux_kernel
6.2 ≤
𝑥
< 6.6.95
linuxlinux_kernel
6.7 ≤
𝑥
< 6.12.35
linuxlinux_kernel
6.13 ≤
𝑥
< 6.15.4
linuxlinux_kernel
4.3
linuxlinux_kernel
4.3:rc3
linuxlinux_kernel
4.3:rc4
linuxlinux_kernel
4.3:rc5
linuxlinux_kernel
4.3:rc6
linuxlinux_kernel
4.3:rc7
debiandebian_linux
11.0
𝑥
= Vulnerable software versions