Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-38125

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-03 Jul, 2025 | 08:35
Updated At-06 Feb, 2026 | 16:31
Rejected At-
Credits

net: stmmac: make sure that ptp_rate is not 0 before configuring EST

In the Linux kernel, the following vulnerability has been resolved: net: stmmac: make sure that ptp_rate is not 0 before configuring EST If the ptp_rate recorded earlier in the driver happens to be 0, this bogus value will propagate up to EST configuration, where it will trigger a division by 0. Prevent this division by 0 by adding the corresponding check and error code.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:03 Jul, 2025 | 08:35
Updated At:06 Feb, 2026 | 16:31
Rejected At:
▼CVE Numbering Authority (CNA)
net: stmmac: make sure that ptp_rate is not 0 before configuring EST

In the Linux kernel, the following vulnerability has been resolved: net: stmmac: make sure that ptp_rate is not 0 before configuring EST If the ptp_rate recorded earlier in the driver happens to be 0, this bogus value will propagate up to EST configuration, where it will trigger a division by 0. Prevent this division by 0 by adding the corresponding check and error code.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/ethernet/stmicro/stmmac/stmmac_est.c
Default Status
unaffected
Versions
Affected
  • From 8572aec3d0dc43045254fd1bf581fb980bfdbc4b before b15c9a21950e1af6d440ce5a8edfa8a94b9acb9b (git)
  • From 8572aec3d0dc43045254fd1bf581fb980bfdbc4b before d6b0f7ed3e9b6c5e2e3a006c8f72c95aa4ac4b74 (git)
  • From 8572aec3d0dc43045254fd1bf581fb980bfdbc4b before b92ec4a848728460f181def33735605f154d438f (git)
  • From 8572aec3d0dc43045254fd1bf581fb980bfdbc4b before 451ee661d0f6272017fa012f99617101aa8ddf2c (git)
  • From 8572aec3d0dc43045254fd1bf581fb980bfdbc4b before d5e3bfdba0dc419499b801937128957f77503761 (git)
  • From 8572aec3d0dc43045254fd1bf581fb980bfdbc4b before cbefe2ffa7784525ec5d008ba87c7add19ec631a (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/ethernet/stmicro/stmmac/stmmac_est.c
Default Status
affected
Versions
Affected
  • 5.6
Unaffected
  • From 0 before 5.6 (semver)
  • From 5.15.199 through 5.15.* (semver)
  • From 6.1.162 through 6.1.* (semver)
  • From 6.6.120 through 6.6.* (semver)
  • From 6.12.34 through 6.12.* (semver)
  • From 6.15.3 through 6.15.* (semver)
  • From 6.16 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/b15c9a21950e1af6d440ce5a8edfa8a94b9acb9b
N/A
https://git.kernel.org/stable/c/d6b0f7ed3e9b6c5e2e3a006c8f72c95aa4ac4b74
N/A
https://git.kernel.org/stable/c/b92ec4a848728460f181def33735605f154d438f
N/A
https://git.kernel.org/stable/c/451ee661d0f6272017fa012f99617101aa8ddf2c
N/A
https://git.kernel.org/stable/c/d5e3bfdba0dc419499b801937128957f77503761
N/A
https://git.kernel.org/stable/c/cbefe2ffa7784525ec5d008ba87c7add19ec631a
N/A
Hyperlink: https://git.kernel.org/stable/c/b15c9a21950e1af6d440ce5a8edfa8a94b9acb9b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d6b0f7ed3e9b6c5e2e3a006c8f72c95aa4ac4b74
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b92ec4a848728460f181def33735605f154d438f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/451ee661d0f6272017fa012f99617101aa8ddf2c
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d5e3bfdba0dc419499b801937128957f77503761
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/cbefe2ffa7784525ec5d008ba87c7add19ec631a
Resource: N/A
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:03 Jul, 2025 | 09:15
Updated At:06 Feb, 2026 | 17:16

In the Linux kernel, the following vulnerability has been resolved: net: stmmac: make sure that ptp_rate is not 0 before configuring EST If the ptp_rate recorded earlier in the driver happens to be 0, this bogus value will propagate up to EST configuration, where it will trigger a division by 0. Prevent this division by 0 by adding the corresponding check and error code.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.6(inclusive) to 6.12.34(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.13(inclusive) to 6.15.3(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/451ee661d0f6272017fa012f99617101aa8ddf2c416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/b15c9a21950e1af6d440ce5a8edfa8a94b9acb9b416baaa9-dc9f-4396-8d5f-8c081fb06d67
N/A
https://git.kernel.org/stable/c/b92ec4a848728460f181def33735605f154d438f416baaa9-dc9f-4396-8d5f-8c081fb06d67
N/A
https://git.kernel.org/stable/c/cbefe2ffa7784525ec5d008ba87c7add19ec631a416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/d5e3bfdba0dc419499b801937128957f77503761416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/d6b0f7ed3e9b6c5e2e3a006c8f72c95aa4ac4b74416baaa9-dc9f-4396-8d5f-8c081fb06d67
N/A
Hyperlink: https://git.kernel.org/stable/c/451ee661d0f6272017fa012f99617101aa8ddf2c
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/b15c9a21950e1af6d440ce5a8edfa8a94b9acb9b
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b92ec4a848728460f181def33735605f154d438f
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/cbefe2ffa7784525ec5d008ba87c7add19ec631a
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/d5e3bfdba0dc419499b801937128957f77503761
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/d6b0f7ed3e9b6c5e2e3a006c8f72c95aa4ac4b74
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found