CVE-2023-53507Incomplete Cleanup in Linux

CWE-459Incomplete Cleanup5 documents5 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 95.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Unregister devlink params in case interface is down Currently, in case an interface is down, mlx5 driver doesn't unregister its devlink params, which leads to this WARN[1]. Fix it by unregistering devlink params in that case as well. [1] [ 295.244769 ] WARNING: CPU: 15 PID: 1 at net/core/devlink.c:9042 devlink_free+0x174/0x1fc [ 295.488379 ] CPU: 15 PID: 1 Comm: shutdown Tainted: G S OE 5.15.0-1017.19.3.g0677e61-blu

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel6.46.4.10+1
Debianlinux/linux_kernel< 6.4.11-1+1
CVEListV5linux/linuxfe578cbb2f053f465e19d2671a523dcd01953888471f59b3455314f0cafacf3096453727876355a9+2
debiandebian/linux< linux 6.4.11-1 (forky)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-q74c-c6q2-f852: In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Unregister devlink params in case interface is down Currently, in case2025-10-01
OSV
CVE-2023-53507: In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Unregister devlink params in case interface is down Currently, in case a2025-10-01

📋Vendor Advisories

2
Red Hat
kernel: net/mlx5: Unregister devlink params in case interface is down2025-10-01
Debian
CVE-2023-53507: linux - In the Linux kernel, the following vulnerability has been resolved: net/mlx5: U...2023