CVE-2023-54149 — Incorrect Synchronization in Linux
Severity
4.7MEDIUM
No vectorEPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
net: dsa: avoid suspicious RCU usage for synced VLAN-aware MAC addresses
When using the felix driver (the only one which supports UC filtering
and MC filtering) as a DSA master for a random other DSA switch, one can
see the following stack trace when the downstream switch ports join a
VLAN-aware bridge:
WARNING: suspicious RCU usage
net/8021q/vlan_core.c:238 suspicious rcu_dereference_protected() usage!
stack backtrace:
Work…
Affected Packages4 packages
▶CVEListV5linux/linux64fdc5f341db01200e33105265d4b8450122a82e — 3948c69b3837fec2ee5a90fbc911c343199be0ac+4
🔴Vulnerability Details
3GHSA▶
GHSA-4vh9-h9jw-r347: In the Linux kernel, the following vulnerability has been resolved:
net: dsa: avoid suspicious RCU usage for synced VLAN-aware MAC addresses
When us↗2025-12-24
OSV▶
CVE-2023-54149: In the Linux kernel, the following vulnerability has been resolved: net: dsa: avoid suspicious RCU usage for synced VLAN-aware MAC addresses When usin↗2025-12-24