Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-53134— bnxt_en: Avoid order-5 memory allocation for TPA data

EPSS 0.06% · P19
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-53134

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
bnxt_en: Avoid order-5 memory allocation for TPA data
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Avoid order-5 memory allocation for TPA data The driver needs to keep track of all the possible concurrent TPA (GRO/LRO) completions on the aggregation ring. On P5 chips, the maximum number of concurrent TPA is 256 and the amount of memory we allocate is order-5 on systems using 4K pages. Memory allocation failure has been reported: NetworkManager: page allocation failure: order:5, mode:0x40dc0(GFP_KERNEL|__GFP_COMP|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0-1 CPU: 15 PID: 2995 Comm: NetworkManager Kdump: loaded Not tainted 5.10.156 #1 Hardware name: Dell Inc. PowerEdge R660/0M1CC5, BIOS 0.2.25 08/12/2022 Call Trace: dump_stack+0x57/0x6e warn_alloc.cold.120+0x7b/0xdd ? _cond_resched+0x15/0x30 ? __alloc_pages_direct_compact+0x15f/0x170 __alloc_pages_slowpath.constprop.108+0xc58/0xc70 __alloc_pages_nodemask+0x2d0/0x300 kmalloc_order+0x24/0xe0 kmalloc_order_trace+0x19/0x80 bnxt_alloc_mem+0x1150/0x15c0 [bnxt_en] ? bnxt_get_func_stat_ctxs+0x13/0x60 [bnxt_en] __bnxt_open_nic+0x12e/0x780 [bnxt_en] bnxt_open+0x10b/0x240 [bnxt_en] __dev_open+0xe9/0x180 __dev_change_flags+0x1af/0x220 dev_change_flags+0x21/0x60 do_setlink+0x35c/0x1100 Instead of allocating this big chunk of memory and dividing it up for the concurrent TPA instances, allocate each small chunk separately for each TPA instance. This will reduce it to order-0 allocations.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于错误解映射导致空指针取消引用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 79632e9ba38671215fb193346ef6fb8db582744d ~ 16f3aae1aa2dd89bc8d073a67f190af580386ae9 -
LinuxLinux 5.4 -

II. Public POCs for CVE-2023-53134

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-53134

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-05-02 · 107 CVEs total

CVE-2023-53100ext4: fix WARNING in ext4_update_inline_data
CVE-2023-53114i40e: Fix kernel crash during reboot when adapter is in recovery mode
CVE-2023-53112drm/i915/sseu: fix max_subslices array-index-out-of-bounds access
CVE-2023-53113wifi: nl80211: fix NULL-ptr deref in offchan check
CVE-2023-53111loop: Fix use-after-free issues
CVE-2023-53109net: tunnels: annotate lockless accesses to dev->needed_headroom
CVE-2023-53110net/smc: fix NULL sndbuf_desc in smc_cdc_tx_handler()
CVE-2023-53108net/iucv: Fix size of interrupt data
CVE-2023-53106nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition
CVE-2023-53107veth: Fix use after free in XDP_REDIRECT
CVE-2023-53105net/mlx5e: Fix cleanup null-ptr deref on encap lock
CVE-2023-53103bonding: restore bond's IFF_SLAVE flag if a non-eth dev enslave fails
CVE-2023-53101ext4: zero i_disksize when initializing the bootloader inode
CVE-2023-53102ice: xsk: disable txq irq before flushing hw
CVE-2023-53090drm/amdkfd: Fix an illegal memory access
CVE-2023-53092interconnect: exynos: fix node leak in probe PM QoS error path
CVE-2023-53093tracing: Do not let histogram values have some modifiers
CVE-2023-53091ext4: update s_journal_inum if it changes after journal replay
CVE-2023-53094tty: serial: fsl_lpuart: fix race on RX DMA shutdown
CVE-2023-53089ext4: fix task hung in ext4_xattr_delete_inode

Showing top 20 of 107 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-53134

No comments yet


Leave a comment