In the Linux kernel, the following vulnerability has been resolved:
phy: hisilicon: Fix an out of bounds check in hisi_inno_phy_probe()
The size of array 'priv->ports[]' is INNO_PHY_PORT_NUM.
In the for loop, 'i' is used as the index for array 'priv->ports[]'
with a check (i > INNO_PHY_PORT_NUM) which indicates that
INNO_PHY_PORT_NUM is allowed value for 'i' in the same loop.
This > comparison needs to be changed to >=, otherwise it potentially leads
to an out of bounds write on the next iteration through the loop
References
Configurations
Configuration 1 (hide)
|
History
04 Dec 2025, 18:51
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| CWE | CWE-125 | |
| References | () https://git.kernel.org/stable/c/01cb355bb92e8fcf8306e11a4774d610c5864e39 - Patch | |
| References | () https://git.kernel.org/stable/c/13c088cf3657d70893d75cf116be937f1509cc0f - Patch | |
| References | () https://git.kernel.org/stable/c/195e806b2afb0bad6470c9094f7e45e0cf109ee0 - Patch | |
| References | () https://git.kernel.org/stable/c/2843a2e703f5cb85c9eeca11b7ee90861635a010 - Patch | |
| References | () https://git.kernel.org/stable/c/6d8a71e4c3a2fa4960cc50996e76a42b62fab677 - Patch | |
| References | () https://git.kernel.org/stable/c/ad249aa3c38f329f91fba8b4b3cd087e79fb0ce8 - Patch | |
| References | () https://git.kernel.org/stable/c/ce69eac840db0b559994dc4290fce3d7c0d7bccd - Patch | |
| First Time |
Linux
Linux linux Kernel |
15 Sep 2025, 15:22
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-15 15:15
Updated : 2025-12-04 18:51
NVD link : CVE-2023-53238
Mitre link : CVE-2023-53238
CVE.ORG link : CVE-2023-53238
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
