-
CVE-2023-53528
- EPSS 0.02%
- Published 01.10.2025 12:15:57
- Last modified 02.10.2025 19:11:46
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix unsafe drain work queue code If create_qp does not fully succeed it is possible for qp cleanup code to attempt to drain the send or recv work queues before the queues have been created causing a seg fault. This patch checks to see if the queues exist before attempting to drain them.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
da572f6313aeead1f79e0810666bd8d8ffc794d4
Version
49dc9c1f0c7e396654a31a480328fffd902fa494
Status
affected
Version <
d366642b3099bd322375f5b71ba84ab1d586cd6d
Version
49dc9c1f0c7e396654a31a480328fffd902fa494
Status
affected
Version <
5993b75d0bc71cd2b441d174b028fc36180f032c
Version
49dc9c1f0c7e396654a31a480328fffd902fa494
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.4
Status
affected
Version <
6.4
Version
0
Status
unaffected
Version <=
6.4.*
Version
6.4.16
Status
unaffected
Version <=
6.5.*
Version
6.5.3
Status
unaffected
Version <=
*
Version
6.6
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.044 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|