We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-52984

net: phy: dp83822: Fix null pointer access on DP83825/DP83826 devices



Description

In the Linux kernel, the following vulnerability has been resolved: net: phy: dp83822: Fix null pointer access on DP83825/DP83826 devices The probe() function is only used for the DP83822 PHY, leaving the private data pointer uninitialized for the smaller DP83825/26 models. While all uses of the private data structure are hidden in 82822 specific callbacks, configuring the interrupt is shared across all models. This causes a NULL pointer dereference on the smaller PHYs as it accesses the private data unchecked. Verifying the pointer avoids that.

Reserved 2025-03-27 | Published 2025-03-27 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

5dc39fd5ef35bc6919759fa99246581b1adc6b82 before 362a2f5531dc0e5b0b5b3e3a541000dbffa75461
affected

5dc39fd5ef35bc6919759fa99246581b1adc6b82 before 2cd1e9c013ec56421c58921b1ddf1d2d53bd47fa
affected

5dc39fd5ef35bc6919759fa99246581b1adc6b82 before 78901b10522cdf6badf24acf65a892637596bccc
affected

5dc39fd5ef35bc6919759fa99246581b1adc6b82 before 422ae7d9c7221e8d4c8526d0f54106307d69d2dc
affected

Default status
affected

5.10
affected

Any version before 5.10
unaffected

5.10.168
unaffected

5.15.93
unaffected

6.1.11
unaffected

6.2
unaffected

References

git.kernel.org/...c/362a2f5531dc0e5b0b5b3e3a541000dbffa75461

git.kernel.org/...c/2cd1e9c013ec56421c58921b1ddf1d2d53bd47fa

git.kernel.org/...c/78901b10522cdf6badf24acf65a892637596bccc

git.kernel.org/...c/422ae7d9c7221e8d4c8526d0f54106307d69d2dc

cve.org (CVE-2023-52984)

nvd.nist.gov (CVE-2023-52984)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-52984

Support options

Helpdesk Chat, Email, Knowledgebase