๐Ÿ” CVE Alert

CVE-2023-54065

UNKNOWN 0.0

net: dsa: realtek: fix out-of-bounds access

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
9th

In the Linux kernel, the following vulnerability has been resolved: net: dsa: realtek: fix out-of-bounds access The probe function sets priv->chip_data to (void *)priv + sizeof(*priv) with the expectation that priv has enough trailing space. However, only realtek-smi actually allocated this chip_data space. Do likewise in realtek-mdio to fix out-of-bounds accesses. These accesses likely went unnoticed so far, because of an (unused) buf[4096] member in struct realtek_priv, which caused kmalloc to round up the allocated buffer to a big enough size, so nothing of value was overwritten. With a different allocator (like in the barebox bootloader port of the driver) or with KASAN, the memory corruption becomes quickly apparent.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 24, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
aac94001067da183455d6d37959892744fa01d9d < cc0f9bb99735d2b68fac68f37b585d615728ce5b aac94001067da183455d6d37959892744fa01d9d < fe668aa499b4b95425044ba11af9609db6ecf466 aac94001067da183455d6d37959892744fa01d9d < b93eb564869321d0dffaf23fcc5c88112ed62466
Linux / Linux
5.18

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/cc0f9bb99735d2b68fac68f37b585d615728ce5b git.kernel.org: https://git.kernel.org/stable/c/fe668aa499b4b95425044ba11af9609db6ecf466 git.kernel.org: https://git.kernel.org/stable/c/b93eb564869321d0dffaf23fcc5c88112ed62466