CVE-2023-53347
BaseFortify
Publication date: 2025-09-17
Last updated on: 2025-12-11
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.0 (inc) to 6.1.31 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.3.5 (exc) |
| linux | linux_kernel | 6.4 |
| linux | linux_kernel | 6.4 |
| linux | linux_kernel | 6.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's mlx5 driver related to handling the pairing of Ethernet switches (E-switch) when switching device modes or unloading devices. Specifically, when a device is switched from switchdev mode to legacy mode or removed/reloaded, the order of unpairing the E-switch and unloading the uplink virtual port (vport) is inconsistent. This causes a bug where duplicated flow entries between peer switches keep invalid pointers. If a peer device is removed first, its internal data is cleared, but the original device still tries to access this cleared data during unpairing, leading to a kernel crash (kernel oops) due to invalid memory access.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash (kernel oops) when devices using the mlx5 driver are removed or reloaded in certain modes. This can lead to system instability or downtime, potentially disrupting network operations on affected systems using the mlx5 driver with virtual functions and link aggregation (VF_LAG).