DEBIAN-CVE-2023-54074

Source
https://security-tracker.debian.org/tracker/CVE-2023-54074
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54074.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2023-54074
Upstream
Published
2025-12-24T13:16:09.253Z
Modified
2025-12-25T11:14:34.575053Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Use correct encap attribute during invalidation With introduction of post action infrastructure most of the users of encap attribute had been modified in order to obtain the correct attribute by calling mlx5etcgetencapattr() helper instead of assuming encap action is always on default attribute. However, the cited commit didn't modify mlx5einvalidateencap() which prevents it from destroying correct modify header action which leads to a warning [0]. Fix the issue by using correct attribute. [0]: Feb 21 09:47:35 c-237-177-40-045 kernel: WARNING: CPU: 17 PID: 654 at drivers/net/ethernet/mellanox/mlx5/core/entc.c:684 mlx5etcattachmodhdr+0x1cc/0x230 [mlx5core] Feb 21 09:47:35 c-237-177-40-045 kernel: RIP: 0010:mlx5etcattachmodhdr+0x1cc/0x230 [mlx5core] Feb 21 09:47:35 c-237-177-40-045 kernel: Call Trace: Feb 21 09:47:35 c-237-177-40-045 kernel: <TASK> Feb 21 09:47:35 c-237-177-40-045 kernel: mlx5etcfibeventwork+0x8e3/0x1f60 [mlx5core] Feb 21 09:47:35 c-237-177-40-045 kernel: ? mlx5etakeallencapflows+0xe0/0xe0 [mlx5core] Feb 21 09:47:35 c-237-177-40-045 kernel: ? lockdowngrade+0x6d0/0x6d0 Feb 21 09:47:35 c-237-177-40-045 kernel: ? lockdephardirqsonprepare+0x273/0x3f0 Feb 21 09:47:35 c-237-177-40-045 kernel: ? lockdephardirqsonprepare+0x273/0x3f0 Feb 21 09:47:35 c-237-177-40-045 kernel: processonework+0x7c2/0x1310 Feb 21 09:47:35 c-237-177-40-045 kernel: ? lockdephardirqsonprepare+0x3f0/0x3f0 Feb 21 09:47:35 c-237-177-40-045 kernel: ? pwqdecnrinflight+0x230/0x230 Feb 21 09:47:35 c-237-177-40-045 kernel: ? rwlockbug.part.0+0x90/0x90 Feb 21 09:47:35 c-237-177-40-045 kernel: workerthread+0x59d/0xec0 Feb 21 09:47:35 c-237-177-40-045 kernel: ? _kthread_parkme+0xd9/0x1d0

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.37-1

Affected versions

6.*

6.1.27-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54074.json"

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.3.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54074.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.3.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54074.json"