CVE-2023-54074

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-54074
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54074.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54074
Downstream
Published
2025-12-24T12:23:16.920Z
Modified
2025-12-29T11:18:01.181226Z
Summary
net/mlx5e: Use correct encap attribute during invalidation
Details

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Use correct encap attribute during invalidation

With introduction of post action infrastructure most of the users of encap attribute had been modified in order to obtain the correct attribute by calling mlx5etcgetencapattr() helper instead of assuming encap action is always on default attribute. However, the cited commit didn't modify mlx5einvalidateencap() which prevents it from destroying correct modify header action which leads to a warning [0]. Fix the issue by using correct attribute.

[0]:

Feb 21 09:47:35 c-237-177-40-045 kernel: WARNING: CPU: 17 PID: 654 at drivers/net/ethernet/mellanox/mlx5/core/entc.c:684 mlx5etcattachmodhdr+0x1cc/0x230 [mlx5core] Feb 21 09:47:35 c-237-177-40-045 kernel: RIP: 0010:mlx5etcattachmodhdr+0x1cc/0x230 [mlx5core] Feb 21 09:47:35 c-237-177-40-045 kernel: Call Trace: Feb 21 09:47:35 c-237-177-40-045 kernel: <TASK> Feb 21 09:47:35 c-237-177-40-045 kernel: mlx5etcfibeventwork+0x8e3/0x1f60 [mlx5core] Feb 21 09:47:35 c-237-177-40-045 kernel: ? mlx5etakeallencapflows+0xe0/0xe0 [mlx5core] Feb 21 09:47:35 c-237-177-40-045 kernel: ? lockdowngrade+0x6d0/0x6d0 Feb 21 09:47:35 c-237-177-40-045 kernel: ? lockdephardirqsonprepare+0x273/0x3f0 Feb 21 09:47:35 c-237-177-40-045 kernel: ? lockdephardirqsonprepare+0x273/0x3f0 Feb 21 09:47:35 c-237-177-40-045 kernel: processonework+0x7c2/0x1310 Feb 21 09:47:35 c-237-177-40-045 kernel: ? lockdephardirqsonprepare+0x3f0/0x3f0 Feb 21 09:47:35 c-237-177-40-045 kernel: ? pwqdecnrinflight+0x230/0x230 Feb 21 09:47:35 c-237-177-40-045 kernel: ? rwlockbug.part.0+0x90/0x90 Feb 21 09:47:35 c-237-177-40-045 kernel: workerthread+0x59d/0xec0 Feb 21 09:47:35 c-237-177-40-045 kernel: ? _kthread_parkme+0xd9/0x1d0

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54074.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8300f225268be9ee2c0daf5a3f23929fcdcbf213
Fixed
00959a1bad58e4b6c14a2729f84d354255073609
Fixed
b8b4292fdd8818ab43b943b6717811651f51e39f
Fixed
be071cdb167fc3e25fe81922166b3d499d23e8ac

Affected versions

v5.*

v5.17
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.11
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.16
v6.1.17
v6.1.18
v6.1.19
v6.1.2
v6.1.20
v6.1.21
v6.1.22
v6.1.23
v6.1.24
v6.1.25
v6.1.26
v6.1.27
v6.1.28
v6.1.29
v6.1.3
v6.1.30
v6.1.4
v6.1.5
v6.1.6
v6.1.7
v6.1.8
v6.1.9
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.3.1
v6.3.2
v6.3.3
v6.3.4
v6.4-rc1
v6.4-rc2

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54074.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
6.1.31
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.3.5

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54074.json"