{"id":"CVE-2023-54236","summary":"net/net_failover: fix txq exceeding warning","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/net_failover: fix txq exceeding warning\n\nThe failover txq is inited as 16 queues.\nwhen a packet is transmitted from the failover device firstly,\nthe failover device will select the queue which is returned from\nthe primary device if the primary device is UP and running.\nIf the primary device txq is bigger than the default 16,\nit can lead to the following warning:\neth0 selects TX queue 18, but real number of TX queues is 16\n\nThe warning backtrace is:\n[   32.146376] CPU: 18 PID: 9134 Comm: chronyd Tainted: G            E      6.2.8-1.el7.centos.x86_64 #1\n[   32.147175] Hardware name: Red Hat KVM, BIOS 1.10.2-3.el7_4.1 04/01/2014\n[   32.147730] Call Trace:\n[   32.147971]  \u003cTASK\u003e\n[   32.148183]  dump_stack_lvl+0x48/0x70\n[   32.148514]  dump_stack+0x10/0x20\n[   32.148820]  netdev_core_pick_tx+0xb1/0xe0\n[   32.149180]  __dev_queue_xmit+0x529/0xcf0\n[   32.149533]  ? __check_object_size.part.0+0x21c/0x2c0\n[   32.149967]  ip_finish_output2+0x278/0x560\n[   32.150327]  __ip_finish_output+0x1fe/0x2f0\n[   32.150690]  ip_finish_output+0x2a/0xd0\n[   32.151032]  ip_output+0x7a/0x110\n[   32.151337]  ? __pfx_ip_finish_output+0x10/0x10\n[   32.151733]  ip_local_out+0x5e/0x70\n[   32.152054]  ip_send_skb+0x19/0x50\n[   32.152366]  udp_send_skb.isra.0+0x163/0x3a0\n[   32.152736]  udp_sendmsg+0xba8/0xec0\n[   32.153060]  ? __folio_memcg_unlock+0x25/0x60\n[   32.153445]  ? __pfx_ip_generic_getfrag+0x10/0x10\n[   32.153854]  ? sock_has_perm+0x85/0xa0\n[   32.154190]  inet_sendmsg+0x6d/0x80\n[   32.154508]  ? inet_sendmsg+0x6d/0x80\n[   32.154838]  sock_sendmsg+0x62/0x70\n[   32.155152]  ____sys_sendmsg+0x134/0x290\n[   32.155499]  ___sys_sendmsg+0x81/0xc0\n[   32.155828]  ? _get_random_bytes.part.0+0x79/0x1a0\n[   32.156240]  ? ip4_datagram_release_cb+0x5f/0x1e0\n[   32.156649]  ? get_random_u16+0x69/0xf0\n[   32.156989]  ? __fget_light+0xcf/0x110\n[   32.157326]  __sys_sendmmsg+0xc4/0x210\n[   32.157657]  ? __sys_connect+0xb7/0xe0\n[   32.157995]  ? __audit_syscall_entry+0xce/0x140\n[   32.158388]  ? syscall_trace_enter.isra.0+0x12c/0x1a0\n[   32.158820]  __x64_sys_sendmmsg+0x24/0x30\n[   32.159171]  do_syscall_64+0x38/0x90\n[   32.159493]  entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nFix that by reducing txq number as the non-existent primary-dev does.","modified":"2026-04-02T09:45:42.396080Z","published":"2025-12-30T12:11:26.373Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0316-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54236.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/105cc268328231d5c2bfcbd03f265cec444a3492"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2d5cebf57296f0189a61482035ad420384eedead"},{"type":"WEB","url":"https://git.kernel.org/stable/c/44d250c22209c680f61befbc2ac326da5452da01"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c942f5cd63b7c2e73fe06744185a34b03267595b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e3cbdcb0fbb61045ef3ce0e072927cc41737f787"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f032e125149d914e542548c17ebd613851031368"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54236.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54236"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"cfc80d9a11635404a40199a1c9471c96890f3f74"},{"fixed":"105cc268328231d5c2bfcbd03f265cec444a3492"},{"fixed":"f032e125149d914e542548c17ebd613851031368"},{"fixed":"2d5cebf57296f0189a61482035ad420384eedead"},{"fixed":"c942f5cd63b7c2e73fe06744185a34b03267595b"},{"fixed":"44d250c22209c680f61befbc2ac326da5452da01"},{"fixed":"e3cbdcb0fbb61045ef3ce0e072927cc41737f787"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54236.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.18.0"},{"fixed":"5.4.240"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.177"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.106"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.23"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.2.10"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54236.json"}}],"schema_version":"1.7.5"}