CVE-2023-54216 — Use of Potentially Dangerous Function in Linux
Severity
5.3MEDIUM
No vectorEPSS
0.0%
top 92.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: TC, Fix using eswitch mapping in nic mode
Cited patch is using the eswitch object mapping pool while
in nic mode where it isn't initialized. This results in the
trace below [0].
Fix that by using either nic or eswitch object mapping pool
depending if eswitch is enabled or not.
[0]:
[ 826.446057] ==================================================================
[ 826.446729] BUG: KASAN: slab-use-after-free in mlx5…
Affected Packages3 packages
▶CVEListV5linux/linux6702782845a5bf381a19b204c369e63420041665 — 4150441c010dec36abc389828e2e4758bd8ad4b3+2
🔴Vulnerability Details
3OSV▶
CVE-2023-54216: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: TC, Fix using eswitch mapping in nic mode Cited patch is using the eswi↗2025-12-30
GHSA▶
GHSA-7cww-g38x-r47j: In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: TC, Fix using eswitch mapping in nic mode
Cited patch is using the es↗2025-12-30