CVE-2023-54223
Use-After-Free Vulnerability in Linux mlx5e XSK Legacy RX Path
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
| mlx5 | mlx5_core | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a flaw in the Linux kernel's mlx5e network driver related to the handling of buffers when using xdpsock in receive (rx) mode for legacy receive queues (rq). Specifically, the buffer is released twice: once in the XDP_REDIRECT path and again in the driver, causing invalid buffer access and potentially leading to a crash (general protection fault). The fix involves setting a flag to avoid releasing the buffer twice on the driver side.
How can this vulnerability impact me? :
The vulnerability can cause system crashes due to invalid buffer access in the network driver when using xdpsock in rx mode with legacy receive queues. This can lead to instability or denial of service on affected systems running the vulnerable Linux kernel.