CVE-2023-53528NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 98.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix unsafe drain work queue code If create_qp does not fully succeed it is possible for qp cleanup code to attempt to drain the send or recv work queues before the queues have been created causing a seg fault. This patch checks to see if the queues exist before attempting to drain them.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.46.4.16+1
Debianlinux/linux_kernel< 6.5.3-1+1
CVEListV5linux/linux49dc9c1f0c7e396654a31a480328fffd902fa494da572f6313aeead1f79e0810666bd8d8ffc794d4+3
debiandebian/linux< linux 6.5.3-1 (forky)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-mcg3-6968-rr84: In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix unsafe drain work queue code If create_qp does not fully succeed i2025-10-01
OSV
CVE-2023-53528: In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix unsafe drain work queue code If create_qp does not fully succeed it2025-10-01

📋Vendor Advisories

2
Red Hat
kernel: RDMA/rxe: Fix unsafe drain work queue code2025-10-01
Debian
CVE-2023-53528: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: F...2023