{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-54156","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-24T13:02:52.530Z","datePublished":"2025-12-24T13:07:06.043Z","dateUpdated":"2026-05-11T19:56:34.258Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:56:34.258Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nsfc: fix crash when reading stats while NIC is resetting\n\nefx_net_stats() (.ndo_get_stats64) can be called during an ethtool\n selftest, during which time nic_data->mc_stats is NULL as the NIC has\n been fini'd.  In this case do not attempt to fetch the latest stats\n from the hardware, else we will crash on a NULL dereference:\n    BUG: kernel NULL pointer dereference, address: 0000000000000038\n    RIP efx_nic_update_stats\n    abridged calltrace:\n    efx_ef10_update_stats_pf\n    efx_net_stats\n    dev_get_stats\n    dev_seq_printf_stats\nSkipping the read is safe, we will simply give out stale stats.\nTo ensure that the free in efx_ef10_fini_nic() does not race against\n efx_ef10_update_stats_pf(), which could cause a TOCTTOU bug, take the\n efx->stats_lock in fini_nic (it is already held across update_stats)."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/sfc/ef10.c"],"versions":[{"version":"d3142c193dca9a2f6878f4128ce1aaf221bb3f99","lessThan":"cb1aa7cc562cab6a87ea33574c8c65f2d2fd7aeb","status":"affected","versionType":"git"},{"version":"d3142c193dca9a2f6878f4128ce1aaf221bb3f99","lessThan":"91f4ef204e731565afdc6c2a7fcf509a3fd6fd67","status":"affected","versionType":"git"},{"version":"d3142c193dca9a2f6878f4128ce1aaf221bb3f99","lessThan":"446f5567934331923d0aec4ce045e4ecb0174aae","status":"affected","versionType":"git"},{"version":"d3142c193dca9a2f6878f4128ce1aaf221bb3f99","lessThan":"470152d76b3ed107d172ea46acc4bfa941f20b4b","status":"affected","versionType":"git"},{"version":"d3142c193dca9a2f6878f4128ce1aaf221bb3f99","lessThan":"aba32b4c58112960c0c708703ca6b44dc8944082","status":"affected","versionType":"git"},{"version":"d3142c193dca9a2f6878f4128ce1aaf221bb3f99","lessThan":"d1b355438b8325a486f087e506d412c4e852f37b","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/sfc/ef10.c"],"versions":[{"version":"5.9","status":"affected"},{"version":"0","lessThan":"5.9","status":"unaffected","versionType":"semver"},{"version":"5.10.188","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.121","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.39","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.3.13","lessThanOrEqual":"6.3.*","status":"unaffected","versionType":"semver"},{"version":"6.4.4","lessThanOrEqual":"6.4.*","status":"unaffected","versionType":"semver"},{"version":"6.5","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"5.10.188"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"5.15.121"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"6.1.39"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"6.3.13"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"6.4.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"6.5"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/cb1aa7cc562cab6a87ea33574c8c65f2d2fd7aeb"},{"url":"https://git.kernel.org/stable/c/91f4ef204e731565afdc6c2a7fcf509a3fd6fd67"},{"url":"https://git.kernel.org/stable/c/446f5567934331923d0aec4ce045e4ecb0174aae"},{"url":"https://git.kernel.org/stable/c/470152d76b3ed107d172ea46acc4bfa941f20b4b"},{"url":"https://git.kernel.org/stable/c/aba32b4c58112960c0c708703ca6b44dc8944082"},{"url":"https://git.kernel.org/stable/c/d1b355438b8325a486f087e506d412c4e852f37b"}],"title":"sfc: fix crash when reading stats while NIC is resetting","x_generator":{"engine":"bippy-1.2.0"}}}}