CVE-2023-53632Linux vulnerability

5 documents5 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7

Description

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Take RTNL lock when needed before calling xdp_set_features() Hold RTNL lock when calling xdp_set_features() with a registered netdev, as the call triggers the netdev notifiers. This could happen when switching from uplink rep to nic profile for example. This resolves the following call trace: RTNL: assertion failed at net/core/dev.c (1953) WARNING: CPU: 6 PID: 112670 at net/core/dev.c:1953 call_netdevice_notifiers

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.3.16.4.11+2
Debianlinux/linux_kernel< 6.4.11-1+1
CVEListV5linux/linux4d5ab0ad964df178beba031b89429a601893ff6116b7775ae4389dd1e885732ea610321c64284e5f+2
debiandebian/linux< linux 6.4.11-1 (forky)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-hqcj-v9r7-994j: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Take RTNL lock when needed before calling xdp_set_features() Hold RTN2025-10-07
OSV
CVE-2023-53632: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Take RTNL lock when needed before calling xdp_set_features() Hold RTNL2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: net/mlx5e: Take RTNL lock when needed before calling xdp_set_features()2025-10-07
Debian
CVE-2023-53632: linux - In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: ...2023