CVE-2023-53463
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ibm | ibmvnic | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's ibmvnic driver. When a NON_FATAL reset happens, the driver incorrectly resets certain byte queue limit (BQL) statistics (num_queued and num_completed) that track bytes sent and completed on the network interface. Because NON_FATAL resets do not flush transmit buffers, resetting these stats causes a mismatch where completed bytes exceed queued bytes. This mismatch triggers a kernel BUG_ON crash, leading to a kernel panic and system instability. The fix is to avoid resetting these stats during NON_FATAL resets to prevent the crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel panic) due to a BUG_ON triggered by inconsistent byte queue statistics in the ibmvnic driver during NON_FATAL resets. Such crashes can lead to system instability, downtime, and potential loss of network connectivity on affected systems using the ibmvnic driver.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for specific error messages related to the ibmvnic driver. Look for repeated 'tx error 600' messages and kernel BUG messages indicating a crash in dynamic_queue_limits.c, such as 'kernel BUG at lib/dynamic_queue_limits.c:27!' and 'Oops: Exception in kernel mode, sig: 5'. You can use commands like 'dmesg | grep ibmvnic' or 'journalctl -k | grep ibmvnic' to check for these error messages in the kernel logs.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the ibmvnic driver does not reset the Byte Queue Limit (dql) stats during a NON_FATAL reset. This prevents the mismatch between queued and completed byte counters that leads to kernel crashes. Applying the vendor-provided patch or updating the Linux kernel to a version where this issue is fixed is recommended. Avoid performing resets that call netdev_tx_reset_queue() on NON_FATAL errors until the fix is applied.