CVE-2023-53238

In the Linux kernel, the following vulnerability has been resolved: phy: hisilicon: Fix an out of bounds check in hisi_inno_phy_probe() The size of array 'priv->ports[]' is INNO_PHY_PORT_NUM. In the for loop, 'i' is used as the index for array 'priv->ports[]' with a check (i > INNO_PHY_PORT_NUM) which indicates that INNO_PHY_PORT_NUM is allowed value for 'i' in the same loop. This > comparison needs to be changed to >=, otherwise it potentially leads to an out of bounds write on the next iteration through the loop
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*

History

04 Dec 2025, 18:51

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CPE cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-125
References () https://git.kernel.org/stable/c/01cb355bb92e8fcf8306e11a4774d610c5864e39 - () https://git.kernel.org/stable/c/01cb355bb92e8fcf8306e11a4774d610c5864e39 - Patch
References () https://git.kernel.org/stable/c/13c088cf3657d70893d75cf116be937f1509cc0f - () https://git.kernel.org/stable/c/13c088cf3657d70893d75cf116be937f1509cc0f - Patch
References () https://git.kernel.org/stable/c/195e806b2afb0bad6470c9094f7e45e0cf109ee0 - () https://git.kernel.org/stable/c/195e806b2afb0bad6470c9094f7e45e0cf109ee0 - Patch
References () https://git.kernel.org/stable/c/2843a2e703f5cb85c9eeca11b7ee90861635a010 - () https://git.kernel.org/stable/c/2843a2e703f5cb85c9eeca11b7ee90861635a010 - Patch
References () https://git.kernel.org/stable/c/6d8a71e4c3a2fa4960cc50996e76a42b62fab677 - () https://git.kernel.org/stable/c/6d8a71e4c3a2fa4960cc50996e76a42b62fab677 - Patch
References () https://git.kernel.org/stable/c/ad249aa3c38f329f91fba8b4b3cd087e79fb0ce8 - () https://git.kernel.org/stable/c/ad249aa3c38f329f91fba8b4b3cd087e79fb0ce8 - Patch
References () https://git.kernel.org/stable/c/ce69eac840db0b559994dc4290fce3d7c0d7bccd - () https://git.kernel.org/stable/c/ce69eac840db0b559994dc4290fce3d7c0d7bccd - Patch
First Time Linux
Linux linux Kernel

15 Sep 2025, 15:22

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-15 15:15

Updated : 2025-12-04 18:51


NVD link : CVE-2023-53238

Mitre link : CVE-2023-53238

CVE.ORG link : CVE-2023-53238


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read