
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability (CVE-2023-53394) was discovered that affects the network subsystem's MLX5E XSK socket handling. The issue was identified when the regular receive queue (rq) is reactivated after an XSK socket is closed, potentially reading stale completion queue entries (cqes) which leads to queue corruption (NVD). This vulnerability was reported by Kal Cuttler Conely, who identified it as a crash occurring on the release path when the xdpsock sample program is stopped and restarted while traffic is running.
The vulnerability occurs in the net/mlx5e subsystem of the Linux kernel, specifically in the XSK (AF_XDP socket) handling code. When the regular receive queue is reactivated after an XSK socket closure, it may read stale completion queue entries, leading to receive queue corruption. This corruption results in two critical issues: the cessation of traffic reception on the regular receive queue and a subsequent crash during the next close or deactivation of the queue (NVD).
The vulnerability's impact includes disruption of network traffic reception and potential system crashes. Specifically, when exploited, it leads to no more traffic being received on the regular receive queue and causes a crash on the next close or deactivation of the receive queue (NVD).
A patch has been developed that addresses the vulnerability by implementing proper completion queue entry flushing during the receive queue flush operation. The fix moves the mlx5erqto_ready code into the flush function and ensures that cqe flushing is performed in the reset state of the receive queue (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."