{"id":"CVE-2025-38725","summary":"net: usb: asix_devices: add phy_mask for ax88772 mdio bus","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix_devices: add phy_mask for ax88772 mdio bus\n\nWithout setting phy_mask for ax88772 mdio bus, current driver may create\nat most 32 mdio phy devices with phy address range from 0x00 ~ 0x1f.\nDLink DUB-E100 H/W Ver B1 is such a device. However, only one main phy\ndevice will bind to net phy driver. This is creating issue during system\nsuspend/resume since phy_polling_mode() in phy_state_machine() will\ndirectly deference member of phydev-\u003edrv for non-main phy devices. Then\nNULL pointer dereference issue will occur. Due to only external phy or\ninternal phy is necessary, add phy_mask for ax88772 mdio bus to workarnoud\nthe issue.","modified":"2026-03-20T12:42:59.795749Z","published":"2025-09-04T15:33:23.468Z","related":["MGASA-2025-0234","MGASA-2025-0235","SUSE-SU-2025:03600-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1","openSUSE-SU-2025:20081-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38725.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/4faff70959d51078f9ee8372f8cff0d7045e4114"},{"type":"WEB","url":"https://git.kernel.org/stable/c/59ed6fbdb1bc03316e09493ffde7066f031c7524"},{"type":"WEB","url":"https://git.kernel.org/stable/c/75947d3200de98a9ded9ad8972e02f1a177097fe"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a754ab53993b1585132e871c5d811167ad3c52ff"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ad1f8313aeec0115f9978bd2d002ef4a8d96c773"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ccef5ee4adf56472aa26bdd1f821a6d0cd06089a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ee2cd40b0bb46056949a2319084a729d95389386"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38725.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38725"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e532a096be0e5e570b383e71d4560e7f04384e0f"},{"fixed":"75947d3200de98a9ded9ad8972e02f1a177097fe"},{"fixed":"59ed6fbdb1bc03316e09493ffde7066f031c7524"},{"fixed":"ccef5ee4adf56472aa26bdd1f821a6d0cd06089a"},{"fixed":"ee2cd40b0bb46056949a2319084a729d95389386"},{"fixed":"a754ab53993b1585132e871c5d811167ad3c52ff"},{"fixed":"ad1f8313aeec0115f9978bd2d002ef4a8d96c773"},{"fixed":"4faff70959d51078f9ee8372f8cff0d7045e4114"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38725.json"}}],"schema_version":"1.7.5"}