CVE-2025-38726NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 4
Latest updateSep 5

Description

In the Linux kernel, the following vulnerability has been resolved: net: ftgmac100: fix potential NULL pointer access in ftgmac100_phy_disconnect After the call to phy_disconnect() netdev->phydev is reset to NULL. So fixed_phy_unregister() would be called with a NULL pointer as argument. Therefore cache the phy_device before this call.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.126.12.43+2
Debianlinux/linux_kernel< 6.12.43-1+1
CVEListV5linux/linuxe24a6c874601efb3de6e535895dd8e4f56fa98f1ae59ec969c07c73f0610f8bd7e648f01e798d222+4
debiandebian/linux< linux 6.16.3-1 (forky)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-2rff-fcfm-wv2q: In the Linux kernel, the following vulnerability has been resolved: net: ftgmac100: fix potential NULL pointer access in ftgmac100_phy_disconnect Af2025-09-05
OSV
CVE-2025-38726: In the Linux kernel, the following vulnerability has been resolved: net: ftgmac100: fix potential NULL pointer access in ftgmac100_phy_disconnect Afte2025-09-04

📋Vendor Advisories

2
Red Hat
kernel: net: ftgmac100: fix potential NULL pointer access in ftgmac100_phy_disconnect2025-09-04
Debian
CVE-2025-38726: linux - In the Linux kernel, the following vulnerability has been resolved: net: ftgmac...2025
CVE-2025-38726 — NULL Pointer Dereference in Linux | cvebase