[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025100125-CVE-2023-53495-3cce@gregkh>
Date: Wed, 1 Oct 2025 13:45:47 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2023-53495: net: ethernet: mvpp2_main: fix possible OOB write in mvpp2_ethtool_get_rxnfc()
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: mvpp2_main: fix possible OOB write in mvpp2_ethtool_get_rxnfc()
rules is allocated in ethtool_get_rxnfc and the size is determined by
rule_cnt from user space. So rule_cnt needs to be check before using
rules to avoid OOB writing or NULL pointer dereference.
The Linux kernel CVE team has assigned CVE-2023-53495 to this issue.
Affected and fixed versions
===========================
Issue introduced in 5.2 with commit 90b509b39ac9b09be88eb641c7a3abd8de06b698 and fixed in 5.4.257 with commit ba6673824efa3dc198b04a54e69dce480066d7d9
Issue introduced in 5.2 with commit 90b509b39ac9b09be88eb641c7a3abd8de06b698 and fixed in 5.10.195 with commit 61054a8ddb176b155a8f2bacdfefb3727187f5d9
Issue introduced in 5.2 with commit 90b509b39ac9b09be88eb641c7a3abd8de06b698 and fixed in 5.15.132 with commit 5bb09dddc724c5f7c4dc6dd3bfebd685eecd93e8
Issue introduced in 5.2 with commit 90b509b39ac9b09be88eb641c7a3abd8de06b698 and fixed in 6.1.54 with commit 349638f7e5d3c7d328565587bb7b0454bbee02e2
Issue introduced in 5.2 with commit 90b509b39ac9b09be88eb641c7a3abd8de06b698 and fixed in 6.5.4 with commit 625b70d31dd4df4b96b3ddcbe251debb33bd67f5
Issue introduced in 5.2 with commit 90b509b39ac9b09be88eb641c7a3abd8de06b698 and fixed in 6.6 with commit 51fe0a470543f345e3c62b6798929de3ddcedc1d
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2023-53495
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/net/ethernet/marvell/mvpp2/mvpp2_main.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/ba6673824efa3dc198b04a54e69dce480066d7d9
https://git.kernel.org/stable/c/61054a8ddb176b155a8f2bacdfefb3727187f5d9
https://git.kernel.org/stable/c/5bb09dddc724c5f7c4dc6dd3bfebd685eecd93e8
https://git.kernel.org/stable/c/349638f7e5d3c7d328565587bb7b0454bbee02e2
https://git.kernel.org/stable/c/625b70d31dd4df4b96b3ddcbe251debb33bd67f5
https://git.kernel.org/stable/c/51fe0a470543f345e3c62b6798929de3ddcedc1d
Powered by blists - more mailing lists