CVE-2023-53841

Source
https://cve.org/CVERecord?id=CVE-2023-53841
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53841.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53841
Downstream
Related
Published
2025-12-09T01:29:58.448Z
Modified
2026-03-31T17:30:01.916867020Z
Summary
devlink: report devlink_port_type_warn source device
Details

In the Linux kernel, the following vulnerability has been resolved:

devlink: report devlinkporttype_warn source device

devlinkporttype_warn is scheduled for port devlink and warning when the port type is not set. But from this warning it is not easy found out which device (driver) has no devlink port set.

[ 3709.975552] Type was not set for devlink port. [ 3709.975579] WARNING: CPU: 1 PID: 13092 at net/devlink/leftover.c:6775 devlinkporttypewarn+0x11/0x20 [ 3709.993967] Modules linked in: openvswitch nfconncount nfnat nfconntrack nfdefragipv6 nfdefragipv4 nfnetlink bluetooth rpcsecgsskrb5 authrpcgss nfsv4 dnsresolver nfs lockd grace fscache netfs vhostnet vhost vhostiotlb tap tun bridge stp llc qrtr intelraplmsr intelraplcommon i10nmedac nfit libnvdimm x86pkgtempthermal mlx5ib intelpowerclamp coretemp dellwmi ledtrigaudio sparsekeymap ipmissif kvmintel ibuverbs rfkill ibcore video kvm iTCOwdt acpiipmi intelvsec irqbypass ipmisi iTCOvendorsupport dcdbas ipmidevintf meime ipmimsghandler rapl mei intelcstate isstifmmio isstifmboxpci dellsmbios inteluncore isstifcommon i2ci801 dellwmidescriptor wmibmof i2csmbus intelpchthermal pcspkr acpipowermeter xfs libcrc32c sdmod sg nvmetcp mgag200 i2calgobit nvmefabrics drmshmemhelper drmkmshelper nvme syscopyarea ahci sysfillrect sysimgblt nvmecore fbsysfops crct10difpclmul libahci mlx5core sfc crc32pclmul nvmecommon drm [ 3709.994030] crc32cintel mtd t10pi mlxfw libata tg3 mdio megaraidsas psample ghashclmulniintel pcihypervintf wmi dmmultipath sunrpc dmmirror dmregionhash dmlog dmmod be2iscsi bnx2i cnic uio cxgb4i cxgb4 tls libcxgbi libcxgb qla4xxx iscsibootsysfs iscsitcp libiscsitcp libiscsi scsitransportiscsi fuse [ 3710.108431] CPU: 1 PID: 13092 Comm: kworker/1:1 Kdump: loaded Not tainted 5.14.0-319.el9.x8664 #1 [ 3710.108435] Hardware name: Dell Inc. PowerEdge R750/0PJ80M, BIOS 1.8.2 09/14/2022 [ 3710.108437] Workqueue: events devlinkporttypewarn [ 3710.108440] RIP: 0010:devlinkporttypewarn+0x11/0x20 [ 3710.108443] Code: 84 76 fe ff ff 48 c7 03 20 0e 1a ad 31 c0 e9 96 fd ff ff 66 0f 1f 44 00 00 0f 1f 44 00 00 48 c7 c7 18 24 4e ad e8 ef 71 62 ff <0f> 0b c3 cc cc cc cc 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 f6 87 [ 3710.108445] RSP: 0018:ff3b6d2e8b3c7e90 EFLAGS: 00010282 [ 3710.108447] RAX: 0000000000000000 RBX: ff366d6580127080 RCX: 0000000000000027 [ 3710.108448] RDX: 0000000000000027 RSI: 00000000ffff86de RDI: ff366d753f41f8c8 [ 3710.108449] RBP: ff366d658ff5a0c0 R08: ff366d753f41f8c0 R09: ff3b6d2e8b3c7e18 [ 3710.108450] R10: 0000000000000001 R11: 0000000000000023 R12: ff366d753f430600 [ 3710.108451] R13: ff366d753f436900 R14: 0000000000000000 R15: ff366d753f436905 [ 3710.108452] FS: 0000000000000000(0000) GS:ff366d753f400000(0000) knlGS:0000000000000000 [ 3710.108453] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3710.108454] CR2: 00007f1c57bc74e0 CR3: 000000111d26a001 CR4: 0000000000773ee0 [ 3710.108456] PKRU: 55555554 [ 3710.108457] Call Trace: [ 3710.108458] <TASK> [ 3710.108459] processonework+0x1e2/0x3b0 [ 3710.108466] ? rescuerthread+0x390/0x390 [ 3710.108468] workerthread+0x50/0x3a0 [ 3710.108471] ? rescuerthread+0x390/0x390 [ 3710.108473] kthread+0xdd/0x100 [ 3710.108477] ? kthreadcompleteandexit+0x20/0x20 [ 3710.108479] retfrom_fork+0x1f/0x30 [ 3710.108485] </TASK> [ 3710.108486] ---[ end trace 1b4b23cd0c65d6a0 ]---

After patch: [ 402.473064] ice 0000:41:00.0: Type was not set for devlink port. [ 402.473064] ice 0000:41:00.1: Type was not set for devlink port.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53841.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
136bf27fc0e9376525b9b6d9a1aa08508a0d1ac2
Fixed
970c7035f4b03c7be9f49c403ccf6fb0b70039a1
Fixed
2864cc9a1fd13666ed7fd9064dc3f2c51a85de32
Fixed
7552020e3aa8283b215ca6b3840e6f9281ee4664
Fixed
408d40c729cbe3a918a381405df769491a472122
Fixed
21b9e0efb38eac1fe7bed369e96980cad45aa9c7
Fixed
a52305a81d6bb74b90b400dfa56455d37872fe4b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53841.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.3.0
Fixed
5.4.251
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.188
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.150
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.42
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53841.json"