{
  "threat_severity" : "Moderate",
  "public_date" : "2025-10-07T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: net/mlx5e: Take RTNL lock when needed before calling xdp_set_features()",
    "id" : "2402254",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2402254"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
    "status" : "verified"
  },
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nnet/mlx5e: Take RTNL lock when needed before calling xdp_set_features()\nHold RTNL lock when calling xdp_set_features() with a registered netdev,\nas the call triggers the netdev notifiers. This could happen when\nswitching from uplink rep to nic profile for example.\nThis resolves the following call trace:\nRTNL: assertion failed at net/core/dev.c (1953)\nWARNING: CPU: 6 PID: 112670 at net/core/dev.c:1953 call_netdevice_notifiers_info+0x7c/0x80\nModules linked in: sch_mqprio sch_mqprio_lib act_tunnel_key act_mirred act_skbedit cls_matchall nfnetlink_cttimeout act_gact cls_flower sch_ingress bonding ib_umad ip_gre rdma_ucm mlx5_vfio_pci ipip tunnel4 ip6_gre gre mlx5_ib vfio_pci vfio_pci_core vfio_iommu_type1 ib_uverbs vfio mlx5_core ib_ipoib geneve nf_tables ip6_tunnel tunnel6 iptable_raw openvswitch nsh rpcrdma ib_iser libiscsi scsi_transport_iscsi rdma_cm iw_cm ib_cm ib_core xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcgss oid_registry overlay zram zsmalloc fuse [last unloaded: ib_uverbs]\nCPU: 6 PID: 112670 Comm: devlink Not tainted 6.4.0-rc7_for_upstream_min_debug_2023_06_28_17_02 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nRIP: 0010:call_netdevice_notifiers_info+0x7c/0x80\nCode: 90 ff 80 3d 2d 6b f7 00 00 75 c5 ba a1 07 00 00 48 c7 c6 e4 ce 0b 82 48 c7 c7 c8 f4 04 82 c6 05 11 6b f7 00 01 e8 a4 7c 8e ff <0f> 0b eb a2 0f 1f 44 00 00 55 48 89 e5 41 54 48 83 e4 f0 48 83 ec\nRSP: 0018:ffff8882a21c3948 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffffffff82e6f880 RCX: 0000000000000027\nRDX: ffff88885f99b5c8 RSI: 0000000000000001 RDI: ffff88885f99b5c0\nRBP: 0000000000000028 R08: ffff88887ffabaa8 R09: 0000000000000003\nR10: ffff88887fecbac0 R11: ffff88887ff7bac0 R12: ffff8882a21c3968\nR13: ffff88811c018940 R14: 0000000000000000 R15: ffff8881274401a0\nFS:  00007fe141c81800(0000) GS:ffff88885f980000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f787c28b948 CR3: 000000014bcf3005 CR4: 0000000000370ea0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n<TASK>\n? __warn+0x79/0x120\n? call_netdevice_notifiers_info+0x7c/0x80\n? report_bug+0x17c/0x190\n? handle_bug+0x3c/0x60\n? exc_invalid_op+0x14/0x70\n? asm_exc_invalid_op+0x16/0x20\n? call_netdevice_notifiers_info+0x7c/0x80\n? call_netdevice_notifiers_info+0x7c/0x80\ncall_netdevice_notifiers+0x2e/0x50\nmlx5e_set_xdp_feature+0x21/0x50 [mlx5_core]\nmlx5e_nic_init+0xf1/0x1a0 [mlx5_core]\nmlx5e_netdev_init_profile+0x76/0x110 [mlx5_core]\nmlx5e_netdev_attach_profile+0x1f/0x90 [mlx5_core]\nmlx5e_netdev_change_profile+0x92/0x160 [mlx5_core]\nmlx5e_netdev_attach_nic_profile+0x1b/0x30 [mlx5_core]\nmlx5e_vport_rep_unload+0xaa/0xc0 [mlx5_core]\n__esw_offloads_unload_rep+0x52/0x60 [mlx5_core]\nmlx5_esw_offloads_rep_unload+0x52/0x70 [mlx5_core]\nesw_offloads_unload_rep+0x34/0x70 [mlx5_core]\nesw_offloads_disable+0x2b/0x90 [mlx5_core]\nmlx5_eswitch_disable_locked+0x1b9/0x210 [mlx5_core]\nmlx5_devlink_eswitch_mode_set+0xf5/0x630 [mlx5_core]\n? devlink_get_from_attrs_lock+0x9e/0x110\ndevlink_nl_cmd_eswitch_set_doit+0x60/0xe0\ngenl_family_rcv_msg_doit.isra.0+0xc2/0x110\ngenl_rcv_msg+0x17d/0x2b0\n? devlink_get_from_attrs_lock+0x110/0x110\n? devlink_nl_cmd_eswitch_get_doit+0x290/0x290\n? devlink_pernet_pre_exit+0xf0/0xf0\n? genl_family_rcv_msg_doit.isra.0+0x110/0x110\nnetlink_rcv_skb+0x54/0x100\ngenl_rcv+0x24/0x40\nnetlink_unicast+0x1f6/0x2c0\nnetlink_sendmsg+0x232/0x4a0\nsock_sendmsg+0x38/0x60\n? _copy_from_user+0x2a/0x60\n__sys_sendto+0x110/0x160\n? __count_memcg_events+0x48/0x90\n? handle_mm_fault+0x161/0x260\n? do_user_addr_fault+0x278/0x6e0\n__x64_sys_sendto+0x20/0x30\ndo_syscall_64+0x3d/0x90\nentry_SYSCALL_64_after_hwframe+0x46/0xb0\nRIP: 0033\n---truncated---", "A locking flaw in the Mellanox mlx5 Ethernet driver allowed calls to xdp_set_features() without holding the required rtnetlink (RTNL) lock. \nA local administrator switching device profiles (for example, from an uplink representor to a Network Interface Card profile) could trigger notifier paths without proper synchronization, leading to kernel warnings and potential denial of service (system instability or crash)." ],
  "statement" : "The issue stems from invoking XDP feature updates on a registered network device without the RTNL lock, which can race with network-device notifiers during profile changes in mlx5e. The fix ensures the RTNL lock is taken where required before updating XDP features.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-04-30T00:00:00Z",
    "advisory" : "RHSA-2024:2394",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-427.13.1.el9_4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-04-30T00:00:00Z",
    "advisory" : "RHSA-2024:2394",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-427.13.1.el9_4"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-53632\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53632\nhttps://lore.kernel.org/linux-cve-announce/2025100713-CVE-2023-53632-d2de@gregkh/T" ],
  "name" : "CVE-2023-53632",
  "mitigation" : {
    "value" : "To mitigate this issue, prevent module mlx5_core from being loaded.\nPlease see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
    "lang" : "en:us"
  },
  "csaw" : false
}