๐Ÿ” CVE Alert

CVE-2023-53398

HIGH 7.8

mlx5: fix possible ptp queue fifo use-after-free

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: mlx5: fix possible ptp queue fifo use-after-free Fifo indexes are not checked during pop operations and it leads to potential use-after-free when poping from empty queue. Such case was possible during re-sync action. WARN_ON_ONCE covers future cases. There were out-of-order cqe spotted which lead to drain of the queue and use-after-free because of lack of fifo pointers check. Special check and counter are added to avoid resync operation if SKB could not exist in the fifo because of OOO cqe (skb_id must be between consumer and producer index).

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 18, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
58a518948f60153e8f6cb8361d2712aa3a1af94a < 52e6e7a0bc04c85012a9251c7cf2d444a77eb966 58a518948f60153e8f6cb8361d2712aa3a1af94a < 6afdedc4e66e3846ce497744f01b95c34bf39d21 58a518948f60153e8f6cb8361d2712aa3a1af94a < 3a50cf1e8e5157b82268eee7e330dbe5736a0948
Linux / Linux
6.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/52e6e7a0bc04c85012a9251c7cf2d444a77eb966 git.kernel.org: https://git.kernel.org/stable/c/6afdedc4e66e3846ce497744f01b95c34bf39d21 git.kernel.org: https://git.kernel.org/stable/c/3a50cf1e8e5157b82268eee7e330dbe5736a0948