Home

Description

In the Linux kernel, the following vulnerability has been resolved: net: ftgmac100: fix potential NULL pointer access in ftgmac100_phy_disconnect After the call to phy_disconnect() netdev->phydev is reset to NULL. So fixed_phy_unregister() would be called with a NULL pointer as argument. Therefore cache the phy_device before this call.

PUBLISHED Reserved 2025-04-16 | Published 2025-09-04 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

e24a6c874601efb3de6e535895dd8e4f56fa98f1 (git) before ae59ec969c07c73f0610f8bd7e648f01e798d222
affected

e24a6c874601efb3de6e535895dd8e4f56fa98f1 (git) before 44bcd397ad9cd1a6b25fabb7f5edbee4fb0cfc2e
affected

e24a6c874601efb3de6e535895dd8e4f56fa98f1 (git) before 9ad90dd34b4e8e5be1e45a4559f4de0f14e53af2
affected

e24a6c874601efb3de6e535895dd8e4f56fa98f1 (git) before e88fbc30dda1cb7438515303704ceddb3ade4ecd
affected

Default status
affected

6.12
affected

Any version before 6.12
unaffected

6.12.43 (semver)
unaffected

6.15.11 (semver)
unaffected

6.16.2 (semver)
unaffected

6.17 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/ae59ec969c07c73f0610f8bd7e648f01e798d222

git.kernel.org/...c/44bcd397ad9cd1a6b25fabb7f5edbee4fb0cfc2e

git.kernel.org/...c/9ad90dd34b4e8e5be1e45a4559f4de0f14e53af2

git.kernel.org/...c/e88fbc30dda1cb7438515303704ceddb3ade4ecd

cve.org (CVE-2025-38726)

nvd.nist.gov (CVE-2025-38726)

Download JSON