CVE-2023-53809Linux vulnerability

6 documents5 sources
Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 89.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: l2tp: Avoid possible recursive deadlock in l2tp_tunnel_register() When a file descriptor of pppol2tp socket is passed as file descriptor of UDP socket, a recursive deadlock occurs in l2tp_tunnel_register(). This situation is reproduced by the following program: int main(void) { int sock; struct sockaddr_pppol2tp addr; sock = socket(AF_PPPOX, SOCK_DGRAM, PX_PROTO_OL2TP); if (sock dump_stack_lvl+0x100/0x178 __lock_acquire.cold

Affected Packages4 packages

Linuxlinux/linux_kernel5.11.05.15.99+3
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux2d77e5c0ad79004b5ef901895437e9cce6dfcc7e4a413d360959962995e16a899cf2b9ef53e9fcb9+5
debiandebian/linux< linux 6.1.20-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-f2xq-v5p2-cqjf: In the Linux kernel, the following vulnerability has been resolved: l2tp: Avoid possible recursive deadlock in l2tp_tunnel_register() When a file de2025-12-09
OSV
CVE-2023-53809: In the Linux kernel, the following vulnerability has been resolved: l2tp: Avoid possible recursive deadlock in l2tp_tunnel_register() When a file desc2025-12-09
OSV
l2tp: Avoid possible recursive deadlock in l2tp_tunnel_register()2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: l2tp: Avoid possible recursive deadlock in l2tp_tunnel_register()2025-12-09
Debian
CVE-2023-53809: linux - In the Linux kernel, the following vulnerability has been resolved: l2tp: Avoid...2023