CVE-2023-54257Out-of-bounds Write in Linux

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: net: macb: fix a memory corruption in extended buffer descriptor mode For quite some time we were chasing a bug which looked like a sudden permanent failure of networking and mmc on some of our devices. The bug was very sensitive to any software changes and even more to any kernel debug options. Finally we got a setup where the problem was reproducible with CONFIG_DMA_API_DEBUG=y and it revealed the issue with the rx dma: [

Affected Packages4 packages

Linuxlinux/linux_kernel4.13.04.14.313+6
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux7b4296148066f19b5960127ba579e358df501c22dd7a49a3eaf723a01b2fdf153f98450a82b0b0fe+8
debiandebian/linux< linux 6.1.25-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-54257: In the Linux kernel, the following vulnerability has been resolved: net: macb: fix a memory corruption in extended buffer descriptor mode For quite so2025-12-30
GHSA
GHSA-2773-gxc6-qfcf: In the Linux kernel, the following vulnerability has been resolved: net: macb: fix a memory corruption in extended buffer descriptor mode For quite2025-12-30
OSV
net: macb: fix a memory corruption in extended buffer descriptor mode2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: net: macb: fix a memory corruption in extended buffer descriptor mode2025-12-30
Debian
CVE-2023-54257: linux - In the Linux kernel, the following vulnerability has been resolved: net: macb: ...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54257 Impact, Exploitability, and Mitigation Steps | Wiz