CVE-2023-54148 — Use After Free in Linux
Severity
7.0HIGH
No vectorEPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Move representor neigh cleanup to profile cleanup_tx
For IP tunnel encapsulation in ECMP (Equal-Cost Multipath) mode, as
the flow is duplicated to the peer eswitch, the related neighbour
information on the peer uplink representor is created as well.
In the cited commit, eswitch devcom unpair is moved to uplink unload
API, specifically the profile->cleanup_tx. If there is a encap rule
offloaded in ECMP mode, when on…
Affected Packages4 packages
▶CVEListV5linux/linuxb17294e7aa8c39dbb9c3e28e2d1983c88b94b387 — d628ba98eb1637acce44001e04c718d8dbb1f7ce+4
🔴Vulnerability Details
3GHSA▶
GHSA-hr7g-x38j-56v5: In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Move representor neigh cleanup to profile cleanup_tx
For IP tunnel en↗2025-12-24
OSV▶
CVE-2023-54148: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Move representor neigh cleanup to profile cleanup_tx For IP tunnel enca↗2025-12-24