In the Linux kernel, the following vulnerability has been resolved:
phy: marvell: a3700-comphy: Fix out of bounds read
There is an out of bounds read access of ‘gbe_phy_init_fix[fix_idx].addr’
every iteration after ‘fix_idx’ reaches ‘ARRAY_SIZE(gbe_phy_init_fix)’.
Make sure ‘gbe_phy_init[addr]’ is used when all elements of
‘gbe_phy_init_fix’ array are handled.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
[
{
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"product": "Linux",
"versions": [
{
"status": "affected",
"version": "934337080c6c",
"lessThan": "976df695f579",
"versionType": "git"
},
{
"status": "affected",
"version": "934337080c6c",
"lessThan": "610f175d2e16",
"versionType": "git"
},
{
"status": "affected",
"version": "934337080c6c",
"lessThan": "40406dfbc060",
"versionType": "git"
},
{
"status": "affected",
"version": "934337080c6c",
"lessThan": "e4308bc22b9d",
"versionType": "git"
}
],
"programFiles": [
"drivers/phy/marvell/phy-mvebu-a3700-comphy.c"
],
"defaultStatus": "unaffected"
},
{
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"product": "Linux",
"versions": [
{
"status": "affected",
"version": "5.18"
},
{
"status": "unaffected",
"version": "0",
"lessThan": "5.18",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "6.1.90",
"versionType": "custom",
"lessThanOrEqual": "6.1.*"
},
{
"status": "unaffected",
"version": "6.6.30",
"versionType": "custom",
"lessThanOrEqual": "6.6.*"
},
{
"status": "unaffected",
"version": "6.8.9",
"versionType": "custom",
"lessThanOrEqual": "6.8.*"
},
{
"status": "unaffected",
"version": "6.9",
"versionType": "original_commit_for_fix",
"lessThanOrEqual": "*"
}
],
"programFiles": [
"drivers/phy/marvell/phy-mvebu-a3700-comphy.c"
],
"defaultStatus": "affected"
}
]