CVE-2023-53188Race Condition in Linux

Severity
4.7MEDIUMNVD
EPSS
0.0%
top 97.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 15

Description

In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix race on port output assume the following setup on a single machine: 1. An openvswitch instance with one bridge and default flows 2. two network namespaces "server" and "client" 3. two ovs interfaces "server" and "client" on the bridge 4. for each ovs interface a veth pair with a matching name and 32 rx and tx queues 5. move the ends of the veth pairs to the respective network namespaces 6. assign ip addre

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.0 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel4.35.4.293+5
Debianlinux/linux_kernel< 5.10.237-1+3
CVEListV5linux/linux7f8a436eaa2c3ddd8e1ff2fbca267e62750855369b0dd09c1ceb35950d2884848099fccc9ec9a123+6
debiandebian/linux< linux 6.1.25-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53188: In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix race on port output assume the following setup on a single m2025-09-15
GHSA
GHSA-j5c6-h3mg-24rj: In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix race on port output assume the following setup on a single2025-09-15

📋Vendor Advisories

2
Red Hat
kernel: net: openvswitch: fix race on port output2025-09-15
Debian
CVE-2023-53188: linux - In the Linux kernel, the following vulnerability has been resolved: net: openvs...2023
CVE-2023-53188 — Race Condition in Linux | cvebase