Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net: ftgmac100: fix potential NULL pointer access in ftgmac100_phy_disconnect After the call to phy_disconnect() netdev->phydev is reset to NULL. So fixed_phy_unregister() would be called with a NULL pointer as argument. Therefore cache the phy_device before this call.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.12, < 6.12.43 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/44bcd397ad9cd1a6b25fabb7f5edbee4fb0cfc2ePatch
- https://git.kernel.org/stable/c/9ad90dd34b4e8e5be1e45a4559f4de0f14e53af2Patch
- https://git.kernel.org/stable/c/ae59ec969c07c73f0610f8bd7e648f01e798d222Patch
- https://git.kernel.org/stable/c/e88fbc30dda1cb7438515303704ceddb3ade4ecdPatch
FAQ
What is CVE-2025-38726?
CVE-2025-38726 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: net: ftgmac100: fix potential NULL pointer access in ftgmac100_phy_disconnect After the call to phy_disconnect() netdev->phydev is...
How severe is CVE-2025-38726?
CVE-2025-38726 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-38726?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.