CVE-2023-54223 — Linux vulnerability
7 documents6 sources
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 92.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: xsk: Fix invalid buffer access for legacy rq
The below crash can be encountered when using xdpsock in rx mode for
legacy rq: the buffer gets released in the XDP_REDIRECT path, and then
once again in the driver. This fix sets the flag to avoid releasing on
the driver side.
XSK handling of buffers for legacy rq was relying on the caller to set
the skip release flag. But the referenced fix started using fragment
count…
Affected Packages3 packages
▶CVEListV5linux/linuxcbb5379362513cbff450df0457dc370da7244bec — 58a113a35846d9a5bd759beb332e551e28451f09+2
🔴Vulnerability Details
3OSV▶
CVE-2023-54223: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: xsk: Fix invalid buffer access for legacy rq The below crash can be enc↗2025-12-30
GHSA▶
GHSA-9gx4-8f8v-9gxp: In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: xsk: Fix invalid buffer access for legacy rq
The below crash can be e↗2025-12-30