CVE-2023-53011

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53011
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53011.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53011
Downstream
Published
2025-03-27T16:43:40Z
Modified
2025-10-21T15:27:27.364777Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
net: stmmac: enable all safety features by default
Details

In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: enable all safety features by default

In the original implementation of dwmac5 commit 8bf993a5877e ("net: stmmac: Add support for DWMAC5 and implement Safety Features") all safety features were enabled by default.

Later it seems some implementations didn't have support for all the features, so in commit 5ac712dcdfef ("net: stmmac: enable platform specific safety features") the safetyfeatcfg structure was added to the callback and defined for some platforms to selectively enable these safety features.

The problem is that only certain platforms were given that software support. If the automotive safety package bit is set in the hardware features register the safety feature callback is called for the platform, and for platforms that didn't get a safetyfeatcfg defined this results in the following NULL pointer dereference:

[ 7.933303] Call trace: [ 7.935812] dwmac5safetyfeatconfig+0x20/0x170 [stmmac] [ 7.941455] stmmacopen+0x16c/0x474 [stmmac] [ 7.946117] stmmacopen+0x38/0x70 [stmmac] [ 7.950414] _devopen+0x100/0x1dc [ 7.954006] _devchangeflags+0x18c/0x204 [ 7.958297] devchangeflags+0x24/0x6c [ 7.962237] dosetlink+0x2b8/0xfa4 [ 7.965827] _rtnlnewlink+0x4ec/0x840 [ 7.969766] rtnlnewlink+0x50/0x80 [ 7.973353] rtnetlinkrcvmsg+0x12c/0x374 [ 7.977557] netlinkrcvskb+0x5c/0x130 [ 7.981500] rtnetlinkrcv+0x18/0x2c [ 7.985172] netlinkunicast+0x2e8/0x340 [ 7.989197] netlinksendmsg+0x1a8/0x420 [ 7.993222] _syssendmsg+0x218/0x280 [ 7.997249] _syssendmsg+0xac/0x100 [ 8.001103] _syssendmsg+0x84/0xe0 [ 8.004776] _arm64syssendmsg+0x24/0x30 [ 8.008983] invokesyscall+0x48/0x114 [ 8.012840] el0svccommon.constprop.0+0xcc/0xec [ 8.017665] doel0svc+0x38/0xb0 [ 8.021071] el0svc+0x2c/0x84 [ 8.024212] el0t64synchandler+0xf4/0x120 [ 8.028598] el0t64sync+0x190/0x194

Go back to the original behavior, if the automotive safety package is found to be supported in hardware enable all the features unless safetyfeatcfg is passed in saying this particular platform only supports a subset of the features.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5ac712dcdfefb1a783384db85e0507d161e87812
Fixed
120b8e527e07c65de7f2b9018dcd9d17e66f2427
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5ac712dcdfefb1a783384db85e0507d161e87812
Fixed
aebf7e62708ba706ee7bf484c9023b15c214e92a
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5ac712dcdfefb1a783384db85e0507d161e87812
Fixed
fdfc76a116b5e9d3e98e6c96fe83b42d011d21d4

Affected versions

v5.*

v5.13
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.24
v5.15.25
v5.15.26
v5.15.27
v5.15.28
v5.15.29
v5.15.3
v5.15.30
v5.15.31
v5.15.32
v5.15.33
v5.15.34
v5.15.35
v5.15.36
v5.15.37
v5.15.38
v5.15.39
v5.15.4
v5.15.40
v5.15.41
v5.15.42
v5.15.43
v5.15.44
v5.15.45
v5.15.46
v5.15.47
v5.15.48
v5.15.49
v5.15.5
v5.15.50
v5.15.51
v5.15.52
v5.15.53
v5.15.54
v5.15.55
v5.15.56
v5.15.57
v5.15.58
v5.15.59
v5.15.6
v5.15.60
v5.15.61
v5.15.62
v5.15.63
v5.15.64
v5.15.65
v5.15.66
v5.15.67
v5.15.68
v5.15.69
v5.15.7
v5.15.70
v5.15.71
v5.15.72
v5.15.73
v5.15.74
v5.15.75
v5.15.76
v5.15.77
v5.15.78
v5.15.79
v5.15.8
v5.15.80
v5.15.81
v5.15.82
v5.15.83
v5.15.84
v5.15.85
v5.15.86
v5.15.87
v5.15.88
v5.15.89
v5.15.9
v5.15.90
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.2
v6.1.3
v6.1.4
v6.1.5
v6.1.6
v6.1.7
v6.1.8
v6.2-rc1
v6.2-rc2
v6.2-rc3

Database specific

vanir_signatures

[
    {
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "155475375944902916790036689513720016269",
                "283807350618420531825628753217492996960",
                "279945033544577391224108340933950801023",
                "39857783282990563717588369894495657196",
                "209414999552623108037237828729790946871",
                "331631826331472856458239221018281439756",
                "87966004829672558067854840708021533763"
            ]
        },
        "deprecated": false,
        "id": "CVE-2023-53011-528b1fe4",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aebf7e62708ba706ee7bf484c9023b15c214e92a",
        "target": {
            "file": "drivers/net/ethernet/stmicro/stmmac/dwmac5.c"
        },
        "signature_version": "v1"
    },
    {
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "155475375944902916790036689513720016269",
                "283807350618420531825628753217492996960",
                "279945033544577391224108340933950801023",
                "39857783282990563717588369894495657196",
                "209414999552623108037237828729790946871",
                "331631826331472856458239221018281439756",
                "87966004829672558067854840708021533763"
            ]
        },
        "deprecated": false,
        "id": "CVE-2023-53011-6dcf222d",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fdfc76a116b5e9d3e98e6c96fe83b42d011d21d4",
        "target": {
            "file": "drivers/net/ethernet/stmicro/stmmac/dwmac5.c"
        },
        "signature_version": "v1"
    },
    {
        "signature_type": "Function",
        "digest": {
            "function_hash": "232730419313557838748451942051286524544",
            "length": 1132.0
        },
        "deprecated": false,
        "id": "CVE-2023-53011-76bdff25",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aebf7e62708ba706ee7bf484c9023b15c214e92a",
        "target": {
            "function": "dwmac5_safety_feat_config",
            "file": "drivers/net/ethernet/stmicro/stmmac/dwmac5.c"
        },
        "signature_version": "v1"
    },
    {
        "signature_type": "Function",
        "digest": {
            "function_hash": "232730419313557838748451942051286524544",
            "length": 1132.0
        },
        "deprecated": false,
        "id": "CVE-2023-53011-78d96941",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fdfc76a116b5e9d3e98e6c96fe83b42d011d21d4",
        "target": {
            "function": "dwmac5_safety_feat_config",
            "file": "drivers/net/ethernet/stmicro/stmmac/dwmac5.c"
        },
        "signature_version": "v1"
    },
    {
        "signature_type": "Function",
        "digest": {
            "function_hash": "232730419313557838748451942051286524544",
            "length": 1132.0
        },
        "deprecated": false,
        "id": "CVE-2023-53011-a27d49d3",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@120b8e527e07c65de7f2b9018dcd9d17e66f2427",
        "target": {
            "function": "dwmac5_safety_feat_config",
            "file": "drivers/net/ethernet/stmicro/stmmac/dwmac5.c"
        },
        "signature_version": "v1"
    },
    {
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "155475375944902916790036689513720016269",
                "283807350618420531825628753217492996960",
                "279945033544577391224108340933950801023",
                "39857783282990563717588369894495657196",
                "209414999552623108037237828729790946871",
                "331631826331472856458239221018281439756",
                "87966004829672558067854840708021533763"
            ]
        },
        "deprecated": false,
        "id": "CVE-2023-53011-da1d5d12",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@120b8e527e07c65de7f2b9018dcd9d17e66f2427",
        "target": {
            "file": "drivers/net/ethernet/stmicro/stmmac/dwmac5.c"
        },
        "signature_version": "v1"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.14.0
Fixed
5.15.91
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.9