CVE-2023-53525Use of Uninitialized Resource in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Allow UD qp_type to join multicast only As for multicast: - The SIDR is the only mode that makes sense; - Besides PS_UDP, other port spaces like PS_IB is also allowed, as it is UD compatible. In this case qkey also needs to be set [1]. This patch allows only UD qp_type to join multicast, and set qkey to default if it's not set, to fix an uninit-value error: the ib->rec.qkey field is accessed without being initialize

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.8.175.9+5
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linuxb5de0c60cc30c2a3513c7188c73f3f29acc29234ae11498851423d6de27aebfe12a5ee85060ab1d5+7
debiandebian/linux< linux 6.1.25-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53525: In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Allow UD qp_type to join multicast only As for multicast: - The SIDR is2025-10-01
GHSA
GHSA-9px7-88w4-86hp: In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Allow UD qp_type to join multicast only As for multicast: - The SIDR i2025-10-01

📋Vendor Advisories

2
Red Hat
kernel: RDMA/cma: Allow UD qp_type to join multicast only2025-10-01
Debian
CVE-2023-53525: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: A...2023