CVE-2024-53088
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-53088 addresses a race condition vulnerability in the Linux kernel's i40e driver that can lead to MAC/VLAN filters becoming corrupted and leaking. The vulnerability was discovered in November 2024 and affects Linux kernel versions from 4.10 up to versions before 5.15.172, 6.1.117, 6.6.61, and 6.11.8. The issue occurs under heavy load when multiple threads concurrently modify MAC/VLAN filters (NVD).

Technical details

The vulnerability manifests as a race condition in the i40e driver when multiple threads concurrently modify MAC/VLAN filters by setting mac and port VLAN. The issue involves Thread T0 allocating a filter in i40e_add_filter() within i40e_ndo_set_vf_port_vlan() while Thread T1 concurrently frees the filter in __i40e_del_filter() within i40e_ndo_set_vf_mac(). Subsequently, i40e_service_task() calls i40e_sync_vsi_filters(), which refers to the already freed filter memory, causing corruption. The vulnerability has been assigned a CVSS v3.1 base score of 4.7 (Medium) with vector AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).

Impact

When exploited, this vulnerability can result in MAC/VLAN filters becoming corrupted and leaking. Under heavy load conditions, the system may display errors such as 'Error I40E_AQ_RC_ENOSPC adding RX filters on VF XX, please set promiscuous on manually for VF XX' in the system logs (Kernel Patch).

Mitigation and workarounds

The fix implements a new intermediate filter state, I40E_FILTER_NEW_SYNC, for the time when a filter is on a tmp_add_list. These filters cannot be deleted from the hash list directly but must be removed using the full process. The patch has been included in various kernel versions and is available through security updates from major Linux distributions (Red Hat Security Advisory).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-71142N/AN/A
  • Linux KernelLinux Kernel
  • kernel-uki-virt-addons
NoNoJan 14, 2026
CVE-2025-71137N/AN/A
  • Linux KernelLinux Kernel
  • linux-azure-6.14
NoYesJan 14, 2026
CVE-2025-71135N/AN/A
  • Linux KernelLinux Kernel
  • kernel-debug-modules-internal
NoNoJan 14, 2026
CVE-2025-71134N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-modules-core
NoNoJan 14, 2026
CVE-2025-71133N/AN/A
  • Linux KernelLinux Kernel
  • linux-ibm-5.15
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management