CVE-2023-54129 — Improper Input Validation in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
octeontx2-af: Add validation for lmac type
Upon physical link change, firmware reports to the kernel about the
change along with the details like speed, lmac_type_id, etc.
Kernel derives lmac_type based on lmac_type_id received from firmware.
In a few scenarios, firmware returns an invalid lmac_type_id, which
is resulting in below kernel panic. This patch adds the missing
validation of the lmac_type_id field.
Internal error:…
Affected Packages4 packages
▶CVEListV5linux/linux61071a871ea6eb2125ece91c1a0dbb124a318c8a — 83a7f27c5b94e43f29f8216a32790751139aa61e+4
🔴Vulnerability Details
3OSV▶
CVE-2023-54129: In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: Add validation for lmac type Upon physical link change, firmware rep↗2025-12-24
GHSA▶
GHSA-646g-pwv5-gp8f: In the Linux kernel, the following vulnerability has been resolved:
octeontx2-af: Add validation for lmac type
Upon physical link change, firmware r↗2025-12-24