CVE-2023-54129

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/12/2025
Last modified:
24/12/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> octeontx2-af: Add validation for lmac type<br /> <br /> Upon physical link change, firmware reports to the kernel about the<br /> change along with the details like speed, lmac_type_id, etc.<br /> Kernel derives lmac_type based on lmac_type_id received from firmware.<br /> <br /> In a few scenarios, firmware returns an invalid lmac_type_id, which<br /> is resulting in below kernel panic. This patch adds the missing<br /> validation of the lmac_type_id field.<br /> <br /> Internal error: Oops: 96000005 [#1] PREEMPT SMP<br /> [ 35.321595] Modules linked in:<br /> [ 35.328982] CPU: 0 PID: 31 Comm: kworker/0:1 Not tainted<br /> 5.4.210-g2e3169d8e1bc-dirty #17<br /> [ 35.337014] Hardware name: Marvell CN103XX board (DT)<br /> [ 35.344297] Workqueue: events work_for_cpu_fn<br /> [ 35.352730] pstate: 40400089 (nZcv daIf +PAN -UAO)<br /> [ 35.360267] pc : strncpy+0x10/0x30<br /> [ 35.366595] lr : cgx_link_change_handler+0x90/0x180

Impact