CVE-2023-53855Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 90.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: net: dsa: ocelot: call dsa_tag_8021q_unregister() under rtnl_lock() on driver remove When the tagging protocol in current use is "ocelot-8021q" and we unbind the driver, we see this splat: $ echo '0000:00:00.2' > /sys/bus/pci/drivers/fsl_enetc/unbind mscc_felix 0000:00:00.5 swp0: left promiscuous mode sja1105 spi2.0: Link is Down DSA: tree 1 torn down mscc_felix 0000:00:00.5 swp2: left promiscuous mode sja1105 spi2.2: Link is

Affected Packages4 packages

Linuxlinux/linux_kernel5.12.06.1.46+1
Debianlinux/linux_kernel< 6.1.52-1+2
CVEListV5linux/linux7c83a7c539abe9f980996063ac20532a7a7f6eb1758dbcfb257e1aee0a310bae789c2af6ffe35d0f+3
debiandebian/linux< linux 6.1.52-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-53855: In the Linux kernel, the following vulnerability has been resolved: net: dsa: ocelot: call dsa_tag_8021q_unregister() under rtnl_lock() on driver remo2025-12-09
GHSA
GHSA-c8r8-vrhj-v7vp: In the Linux kernel, the following vulnerability has been resolved: net: dsa: ocelot: call dsa_tag_8021q_unregister() under rtnl_lock() on driver rem2025-12-09
OSV
net: dsa: ocelot: call dsa_tag_8021q_unregister() under rtnl_lock() on driver remove2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: net: dsa: ocelot: call dsa_tag_8021q_unregister() under rtnl_lock() on driver remove2025-12-09
Debian
CVE-2023-53855: linux - In the Linux kernel, the following vulnerability has been resolved: net: dsa: o...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-53855 Impact, Exploitability, and Mitigation Steps | Wiz