phy: marvell: a3700-comphy: Fix out of bounds read
There is an out of bounds read access of 'gbe_phy_init_fix[fix_idx].addr'
every iteration after 'fix_idx' reaches 'ARRAY_SIZE(gbe_phy_init_fix)'.
Make sure 'gbe_phy_init[addr]' is used when all elements of
'gbe_phy_init_fix' array are handled.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-6921-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6921-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6952-1 | Linux kernel vulnerabilities |
Sun, 04 May 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2026-05-11T20:15:12.277Z
Reserved: 2024-05-17T13:50:33.147Z
Link: CVE-2024-35992
Updated: 2024-08-02T03:30:11.515Z
Status : Modified
Published: 2024-05-20T10:15:13.400
Modified: 2024-11-21T09:21:22.950
Link: CVE-2024-35992
OpenCVE Enrichment
No data.
Ubuntu USN