CVE-2023-54065 — Path Equivalence: 'filename ' (Trailing Space) in Linux
7 documents6 sources
Severity
5.3MEDIUM
No vectorEPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
net: dsa: realtek: fix out-of-bounds access
The probe function sets priv->chip_data to (void *)priv + sizeof(*priv)
with the expectation that priv has enough trailing space.
However, only realtek-smi actually allocated this chip_data space.
Do likewise in realtek-mdio to fix out-of-bounds accesses.
These accesses likely went unnoticed so far, because of an (unused)
buf[4096] member in struct realtek_priv, which caused kmallo…
Affected Packages4 packages
▶CVEListV5linux/linuxaac94001067da183455d6d37959892744fa01d9d — cc0f9bb99735d2b68fac68f37b585d615728ce5b+3
🔴Vulnerability Details
3GHSA▶
GHSA-gwcx-q2c7-j3r5: In the Linux kernel, the following vulnerability has been resolved:
net: dsa: realtek: fix out-of-bounds access
The probe function sets priv->chip_d↗2025-12-24
OSV▶
CVE-2023-54065: In the Linux kernel, the following vulnerability has been resolved: net: dsa: realtek: fix out-of-bounds access The probe function sets priv->chip_dat↗2025-12-24