In the Linux kernel, the following vulnerability has been resolved:
net: mdio: validate parameter addr in mdiobusgetphy()
The caller may pass any value as addr, what may result in an out-of-bounds access to array mdiomap. One existing case is stmmacinit_phy() that may pass -1 as addr. Therefore validate addr before using it.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53019.json"
}[
{
"digest": {
"length": 231.0,
"function_hash": "235227204475499124346915317455189622601"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2023-53019-5fdce0f9",
"target": {
"function": "mdiobus_get_phy",
"file": "drivers/net/phy/mdio_bus.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7879626296e6ffd838ae0f2af1ab49ee46354973"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"193127658758672968622275398373373737002",
"30577885846118591819940282469791926567",
"92856366027775393938975823411132697906",
"42862978150382036391696922888610559799"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2023-53019-6b0487cd",
"target": {
"file": "drivers/net/phy/mdio_bus.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7879626296e6ffd838ae0f2af1ab49ee46354973"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53019.json"