CVE-2023-53079

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53079
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53079.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53079
Downstream
Related
Published
2025-05-02T15:55:28.968Z
Modified
2025-11-27T19:34:47.138477Z
Summary
net/mlx5: Fix steering rules cleanup
Details

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix steering rules cleanup

vport's mc, uc and multicast rules are not deleted in teardown path when EEH happens. Since the vport's promisc settings(uc, mc and all) in firmware are reset after EEH, mlx5 driver will try to delete the above rules in the initialization path. This cause kernel crash because these software rules are no longer valid.

Fix by nullifying these rules right after delete to avoid accessing any dangling pointers.

Call Trace: _listdelentryvalid+0xcc/0x100 (unreliable) treeputnode+0xf4/0x1b0 [mlx5core] treeremovenode+0x30/0x70 [mlx5core] mlx5delflowrules+0x14c/0x1f0 [mlx5core] eswapplyvportrxmode+0x10c/0x200 [mlx5core] eswupdatevportrxmode+0xb4/0x180 [mlx5core] eswvportchangehandlelocked+0x1ec/0x230 [mlx5core] eswenablevport+0x130/0x260 [mlx5core] mlx5eswitchenablesriov+0x2a0/0x2f0 [mlx5core] mlx5deviceenablesriov+0x74/0x440 [mlx5core] mlx5loadone+0x114c/0x1550 [mlx5core] mlx5pciresume+0x68/0xf0 [mlx5core] eehreportresume+0x1a4/0x230 eehpedevtraverse+0x98/0x170 eehhandlenormalevent+0x3e4/0x640 eehhandleevent+0x4c/0x370 eeheventhandler+0x14c/0x210 kthread+0x168/0x1b0 retfromkernel_thread+0x5c/0x84

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/ee626f5d79d5817bb21d6f048dc0da4c4e383443/cves/2023/53xxx/CVE-2023-53079.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a35f71f27a614aff106cc89b86168962bce2725f
Fixed
18cead61e437f4c7898acca0a5f3df12f801d97f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a35f71f27a614aff106cc89b86168962bce2725f
Fixed
4df1f2d36bdc9a368650bf14b9097c555e95f71d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a35f71f27a614aff106cc89b86168962bce2725f
Fixed
63546395a0e6ac264f78f65218086ce6014b4494
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a35f71f27a614aff106cc89b86168962bce2725f
Fixed
6f5780536181d1d0d09a11a1bc92f22e143447e2
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a35f71f27a614aff106cc89b86168962bce2725f
Fixed
922f56e9a795d6f3dd72d3428ebdd7ee040fa855

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.7.0
Fixed
5.10.177
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.105
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.22
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.9