CVE-2023-53591
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-21
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.4 |
| linux | linux_kernel | 6.4 |
| linux | linux_kernel | 6.4 |
| linux | linux_kernel | From 5.13.17 (inc) to 5.14 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.3.5 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.31 (exc) |
| linux | linux_kernel | From 5.14.4 (inc) to 5.15.115 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a deadlock issue in the Linux kernel's mlx5e network driver, specifically in the tc route query code. The problem arises due to a circular locking dependency (ABBA deadlock) when peer flows are created while holding a read-write semaphore. The deadlock occurs because the lock is taken higher up the call chain and the existing code paths do not handle this properly. The fix involves refactoring the code to use lockless execution techniques such as RCU (Read-Copy-Update) for accessing shared data and proper atomic operations for boolean flags, thereby avoiding the deadlock scenario.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to deadlock when handling certain network flow operations involving the mlx5e driver. A deadlock means that affected processes or kernel threads may hang indefinitely, potentially leading to degraded network performance, stalled network traffic, or system instability on systems using this driver and feature set.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for warnings about circular locking dependencies or deadlocks related to mlx5_core, specifically messages similar to 'WARNING: possible circular locking dependency detected' involving mlx5e_attach_encap and mlx5_devcom_get_peer_data. You can check the kernel logs using commands like 'dmesg | grep mlx5_core' or 'journalctl -k | grep mlx5_core' to look for such warnings.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the fix for this deadlock issue in the mlx5e tc route query code. The fix refactors the code to avoid the deadlock by using lockless execution techniques. Until the update is applied, monitoring for deadlock symptoms and avoiding workloads that trigger peer flow creation while holding the devcom rw semaphore may reduce the risk.