CVE-2026-23441

Published: Apr 03, 2026 Last Modified: Apr 03, 2026
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Prevent concurrent access to IPSec ASO context

The query or updating IPSec offload object is through Access ASO WQE.
The driver uses a single mlx5e_ipsec_aso struct for each PF, which
contains a shared DMA-mapped context for all ASO operations.

A race condition exists because the ASO spinlock is released before
the hardware has finished processing WQE. If a second operation is
initiated immediately after, it overwrites the shared context in the
DMA area.

When the first operation's completion is processed later, it reads
this corrupted context, leading to unexpected behavior and incorrect
results.

This commit fixes the race by introducing a private context within
each IPSec offload object. The shared ASO context is now copied to
this private context while the ASO spinlock is held. Subsequent
processing uses this saved, per-object context, ensuring its integrity
is maintained.

https://git.kernel.org/stable/c/2c6a5be0aee5a44066f68a332c30650900e32ad4
https://git.kernel.org/stable/c/6834d196107d5267dcad31b44211da7698e8f618
https://git.kernel.org/stable/c/99aaee927800ea00b441b607737f9f67b1899755
https://git.kernel.org/stable/c/99b36850d881e2d65912b2520a1c80d0fcc9429a
https://git.kernel.org/stable/c/c3db55dc0f3344b62da25b025a8396d78763b5fa