{"id":"CVE-2023-53654","summary":"octeontx2-af: Add validation before accessing cgx and lmac","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-af: Add validation before accessing cgx and lmac\n\nwith the addition of new MAC blocks like CN10K RPM and CN10KB\nRPM_USX, LMACs are noncontiguous and CGX blocks are also\nnoncontiguous. But during RVU driver initialization, the driver\nis assuming they are contiguous and trying to access\ncgx or lmac with their id which is resulting in kernel panic.\n\nThis patch fixes the issue by adding proper checks.\n\n[   23.219150] pc : cgx_lmac_read+0x38/0x70\n[   23.219154] lr : rvu_program_channels+0x3f0/0x498\n[   23.223852] sp : ffff000100d6fc80\n[   23.227158] x29: ffff000100d6fc80 x28: ffff00010009f880 x27:\n000000000000005a\n[   23.234288] x26: ffff000102586768 x25: 0000000000002500 x24:\nfffffffffff0f000","modified":"2026-04-11T12:46:51.030516Z","published":"2025-10-07T15:19:49.985Z","related":["SUSE-SU-2025:21040-1","SUSE-SU-2025:21052-1","SUSE-SU-2025:21056-1","SUSE-SU-2025:21064-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4128-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4140-1","SUSE-SU-2025:4141-1","SUSE-SU-2025:4301-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53654.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/79ebb53772c95d3a6ae51b3c65f9985fdd430df6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a5485a943193e55c79150382e6461e8ea759e96e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b04872e15f3df62cb2fd530950f769626e1ef489"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e425e2ba933618ee5ec8e4f3eb341efeb6c9ddef"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53654.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53654"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"91c6945ea1f9059fea886630d0fd8070740e2aaf"},{"fixed":"e425e2ba933618ee5ec8e4f3eb341efeb6c9ddef"},{"fixed":"a5485a943193e55c79150382e6461e8ea759e96e"},{"fixed":"b04872e15f3df62cb2fd530950f769626e1ef489"},{"fixed":"79ebb53772c95d3a6ae51b3c65f9985fdd430df6"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53654.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.12.0"},{"fixed":"5.15.121"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.39"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53654.json"}}],"schema_version":"1.7.5"}