CVE-2023-53509Uncontrolled Resource Consumption in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: qed: allow sleep in qed_mcp_trace_dump() By default, qed_mcp_cmd_and_union() delays 10us at a time in a loop that can run 500K times, so calls to qed_mcp_nvm_rd_cmd() may block the current thread for over 5s. We observed thread scheduling delays over 700ms in production, with stacktraces pointing to this code as the culprit. qed_mcp_trace_dump() is called from ethtool, so sleeping is permitted. It already can sleep in qed_mcp

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel4.96.0.19+2
Debianlinux/linux_kernel< 6.1.7-1+2
CVEListV5linux/linuxc965db44462919f613973aa618271f6c3f5a1e64e0387f4f39a8d92302273ac356d1f6b2a38160d8+3
debiandebian/linux< linux 6.1.7-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-xj77-m3jq-h2r8: In the Linux kernel, the following vulnerability has been resolved: qed: allow sleep in qed_mcp_trace_dump() By default, qed_mcp_cmd_and_union() del2025-10-01
OSV
CVE-2023-53509: In the Linux kernel, the following vulnerability has been resolved: qed: allow sleep in qed_mcp_trace_dump() By default, qed_mcp_cmd_and_union() delay2025-10-01

📋Vendor Advisories

2
Red Hat
kernel: qed: allow sleep in qed_mcp_trace_dump()2025-10-01
Debian
CVE-2023-53509: linux - In the Linux kernel, the following vulnerability has been resolved: qed: allow ...2023
CVE-2023-53509 — Uncontrolled Resource Consumption | cvebase