{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T02:20:53.604","vulnerabilities":[{"cve":{"id":"CVE-2023-53507","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-10-01T12:15:54.457","lastModified":"2026-01-23T02:03:10.837","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Unregister devlink params in case interface is down\n\nCurrently, in case an interface is down, mlx5 driver doesn't\nunregister its devlink params, which leads to this WARN[1].\nFix it by unregistering devlink params in that case as well.\n\n[1]\n[  295.244769 ] WARNING: CPU: 15 PID: 1 at net/core/devlink.c:9042 devlink_free+0x174/0x1fc\n[  295.488379 ] CPU: 15 PID: 1 Comm: shutdown Tainted: G S         OE 5.15.0-1017.19.3.g0677e61-bluefield #g0677e61\n[  295.509330 ] Hardware name: https://www.mellanox.com BlueField SoC/BlueField SoC, BIOS 4.2.0.12761 Jun  6 2023\n[  295.543096 ] pc : devlink_free+0x174/0x1fc\n[  295.551104 ] lr : mlx5_devlink_free+0x18/0x2c [mlx5_core]\n[  295.561816 ] sp : ffff80000809b850\n[  295.711155 ] Call trace:\n[  295.716030 ]  devlink_free+0x174/0x1fc\n[  295.723346 ]  mlx5_devlink_free+0x18/0x2c [mlx5_core]\n[  295.733351 ]  mlx5_sf_dev_remove+0x98/0xb0 [mlx5_core]\n[  295.743534 ]  auxiliary_bus_remove+0x2c/0x50\n[  295.751893 ]  __device_release_driver+0x19c/0x280\n[  295.761120 ]  device_release_driver+0x34/0x50\n[  295.769649 ]  bus_remove_device+0xdc/0x170\n[  295.777656 ]  device_del+0x17c/0x3a4\n[  295.784620 ]  mlx5_sf_dev_remove+0x28/0xf0 [mlx5_core]\n[  295.794800 ]  mlx5_sf_dev_table_destroy+0x98/0x110 [mlx5_core]\n[  295.806375 ]  mlx5_unload+0x34/0xd0 [mlx5_core]\n[  295.815339 ]  mlx5_unload_one+0x70/0xe4 [mlx5_core]\n[  295.824998 ]  shutdown+0xb0/0xd8 [mlx5_core]\n[  295.833439 ]  pci_device_shutdown+0x3c/0xa0\n[  295.841651 ]  device_shutdown+0x170/0x340\n[  295.849486 ]  __do_sys_reboot+0x1f4/0x2a0\n[  295.857322 ]  __arm64_sys_reboot+0x2c/0x40\n[  295.865329 ]  invoke_syscall+0x78/0x100\n[  295.872817 ]  el0_svc_common.constprop.0+0x54/0x184\n[  295.882392 ]  do_el0_svc+0x30/0xac\n[  295.889008 ]  el0_svc+0x48/0x160\n[  295.895278 ]  el0t_64_sync_handler+0xa4/0x130\n[  295.903807 ]  el0t_64_sync+0x1a4/0x1a8\n[  295.911120 ] ---[ end trace 4f1d2381d00d9dce  ]---"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4","versionEndExcluding":"6.4.10","matchCriteriaId":"36479A9E-8F2E-4EE8-9D1A-B86032750FB1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*","matchCriteriaId":"0B3E6E4D-E24E-4630-B00C-8C9901C597B0"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*","matchCriteriaId":"E4A01A71-0F09-4DB2-A02F-7EFFBE27C98D"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*","matchCriteriaId":"F5608371-157A-4318-8A2E-4104C3467EA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:*","matchCriteriaId":"2226A776-DF8C-49E0-A030-0A7853BB018A"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/471f59b3455314f0cafacf3096453727876355a9","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/53d737dfd3d7b023fa9fa445ea3f3db0ac9da402","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]}]}}]}