Impact
XDP multi-buffer programs can modify the layout of the XDP buffer by pulling data or adjusting the tail. The mlx5e driver incorrectly assumes the layout remains unchanged, and after a recent patch the driver fails to count dropped fragments. This results in an undercount of page fragments, leading to a negative reference count during page release and a kernel crash (splat). The flaw is identified as CWE‑911, an unsafe use of network device interfaces.
Affected Systems
All Linux kernel installations that include the mlx5e network driver before the merge that fixed the fragment counting bug are potentially affected. No specific version ranges are listed; the issue applies to every release containing the vulnerable driver before the patch.
Risk and Exploitability
Because the bug can be triggered by network traffic processed by XDP programs, the attack vector is inferred to be through network packets carrying malicious or malformed data that engage XDP buffer adjustments. The CVSS score is 7.0, and the EPSS score is < 1%; the vulnerability is not listed in CISA's KEV catalog. The result of a kernel panic constitutes a high‑impact denial of service and poses a significant risk to systems that cannot be immediately patched.
OpenCVE Enrichment