First published: Thu Mar 27 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net: phy: dp83822: Fix null pointer access on DP83825/DP83826 devices The probe() function is only used for the DP83822 PHY, leaving the private data pointer uninitialized for the smaller DP83825/26 models. While all uses of the private data structure are hidden in 82822 specific callbacks, configuring the interrupt is shared across all models. This causes a NULL pointer dereference on the smaller PHYs as it accesses the private data unchecked. Verifying the pointer avoids that.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.10<5.10.168 | |
Linux Kernel | >=5.11<5.15.93 | |
Linux Kernel | >=5.16<6.1.11 | |
Linux Kernel | =6.2-rc1 | |
Linux Kernel | =6.2-rc2 | |
Linux Kernel | =6.2-rc3 | |
Linux Kernel | =6.2-rc4 | |
Linux Kernel | =6.2-rc5 | |
Linux Kernel | =6.2-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52984 is classified as a vulnerability in the Linux kernel related to null pointer dereference.
To fix CVE-2023-52984, update to the latest version of the Linux kernel where the vulnerability has been patched.
CVE-2023-52984 affects the DP83825 and DP83826 PHY devices due to uninitialized private data pointers.
If exploited, CVE-2023-52984 could lead to system crashes or other unexpected behavior due to null pointer access.
There is no known workaround for CVE-2023-52984; applying the patch is the recommended approach.