CVE-2023-53855
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's network subsystem, specifically in the Distributed Switch Architecture (DSA) driver for the 'ocelot-8021q' tagging protocol. When the driver is removed (unbound) while using this tagging protocol, the kernel can hit an assertion failure and crash (splat) due to improper locking (missing rtnl_lock) during the call to dsa_tag_8021q_unregister(). This leads to kernel warnings and potential instability during driver removal.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash or become unstable when the 'ocelot-8021q' tagging protocol driver is removed. This can lead to system downtime, loss of network connectivity, and potential disruption of services relying on the affected network driver.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel logs for specific assertion failures and warnings related to the 'ocelot-8021q' tagging protocol when unbinding the driver. For example, running the command to unbind the driver and then checking dmesg or kernel logs for messages like 'RTNL: assertion failed at net/dsa/tag_8021q.c' or 'WARNING: CPU: ... dsa_tag_8021q_unregister'. A sample command to trigger and detect this is: echo '0000:00:00.2' > /sys/bus/pci/drivers/fsl_enetc/unbind followed by dmesg | grep -i 'dsa_tag_8021q_unregister' or dmesg | grep -i 'RTNL: assertion failed'.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves avoiding unbinding the driver when the 'ocelot-8021q' tagging protocol is in use, as this triggers the vulnerability. Applying the patch or update that ensures dsa_tag_8021q_unregister() is called under rtnl_lock() on driver remove will resolve the issue. Until then, refrain from unbinding the affected driver or switching to the 'ocelot-8021q' tagging protocol in production environments.