CVE-2023-53019

Source
https://cve.org/CVERecord?id=CVE-2023-53019
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53019.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53019
Downstream
Related
Published
2025-03-27T16:43:46.493Z
Modified
2026-03-20T12:32:55.107321Z
Summary
net: mdio: validate parameter addr in mdiobus_get_phy()
Details

In the Linux kernel, the following vulnerability has been resolved:

net: mdio: validate parameter addr in mdiobusgetphy()

The caller may pass any value as addr, what may result in an out-of-bounds access to array mdiomap. One existing case is stmmacinit_phy() that may pass -1 as addr. Therefore validate addr before using it.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53019.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7f854420fbfe9d49afe2ffb1df052cfe8e215541
Fixed
1d80c259dfbadefa61b7ea334dfce5cb57f8c72f
Fixed
c431a3d642593bbdb99e8a9e3eed608b730db6f8
Fixed
8a7b9560a3a8eb8724888c426e05926752f73aa0
Fixed
4bc5f1f6bc94e695dfd912122af96e7115a0ddb8
Fixed
ad67de330d83e8078372b52af18ffe8d39e26c85
Fixed
7879626296e6ffd838ae0f2af1ab49ee46354973
Fixed
867dbe784c5010a466f00a7d1467c1c5ea569c75

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53019.json"