CVE-2026-23441
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/04/2026
Last modified:
03/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/mlx5e: Prevent concurrent access to IPSec ASO context<br />
<br />
The query or updating IPSec offload object is through Access ASO WQE.<br />
The driver uses a single mlx5e_ipsec_aso struct for each PF, which<br />
contains a shared DMA-mapped context for all ASO operations.<br />
<br />
A race condition exists because the ASO spinlock is released before<br />
the hardware has finished processing WQE. If a second operation is<br />
initiated immediately after, it overwrites the shared context in the<br />
DMA area.<br />
<br />
When the first operation&#39;s completion is processed later, it reads<br />
this corrupted context, leading to unexpected behavior and incorrect<br />
results.<br />
<br />
This commit fixes the race by introducing a private context within<br />
each IPSec offload object. The shared ASO context is now copied to<br />
this private context while the ASO spinlock is held. Subsequent<br />
processing uses this saved, per-object context, ensuring its integrity<br />
is maintained.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2c6a5be0aee5a44066f68a332c30650900e32ad4
- https://git.kernel.org/stable/c/6834d196107d5267dcad31b44211da7698e8f618
- https://git.kernel.org/stable/c/99aaee927800ea00b441b607737f9f67b1899755
- https://git.kernel.org/stable/c/99b36850d881e2d65912b2520a1c80d0fcc9429a
- https://git.kernel.org/stable/c/c3db55dc0f3344b62da25b025a8396d78763b5fa



