-

CVE-2023-53528

In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix unsafe drain work queue code

If create_qp does not fully succeed it is possible for qp cleanup
code to attempt to drain the send or recv work queues before the
queues have been created causing a seg fault. This patch checks
to see if the queues exist before attempting to drain them.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < da572f6313aeead1f79e0810666bd8d8ffc794d4
Version 49dc9c1f0c7e396654a31a480328fffd902fa494
Status affected
Version < d366642b3099bd322375f5b71ba84ab1d586cd6d
Version 49dc9c1f0c7e396654a31a480328fffd902fa494
Status affected
Version < 5993b75d0bc71cd2b441d174b028fc36180f032c
Version 49dc9c1f0c7e396654a31a480328fffd902fa494
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 6.4
Status affected
Version < 6.4
Version 0
Status unaffected
Version <= 6.4.*
Version 6.4.16
Status unaffected
Version <= 6.5.*
Version 6.5.3
Status unaffected
Version <= *
Version 6.6
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.044
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string