CVE-2023-53398
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
18/09/2025
Last modified:
14/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mlx5: fix possible ptp queue fifo use-after-free<br />
<br />
Fifo indexes are not checked during pop operations and it leads to<br />
potential use-after-free when poping from empty queue. Such case was<br />
possible during re-sync action. WARN_ON_ONCE covers future cases.<br />
<br />
There were out-of-order cqe spotted which lead to drain of the queue and<br />
use-after-free because of lack of fifo pointers check. Special check and<br />
counter are added to avoid resync operation if SKB could not exist in the<br />
fifo because of OOO cqe (skb_id must be between consumer and producer<br />
index).
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0 (including) | 6.1.18 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.2.5 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



