CVE-2023-53539Linux vulnerability

5 documents5 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 96.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix incomplete state save in rxe_requester If a send packet is dropped by the IP layer in rxe_requester() the call to rxe_xmit_packet() can fail with err == -EAGAIN. To recover, the state of the wqe is restored to the state before the packet was sent so it can be resent. However, the routines that save and restore the state miss a significnt part of the variable state in the wqe, the dma struct which is used to proce

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel4.8.16.1.53+3
Debianlinux/linux_kernel< 6.1.55-1+2
CVEListV5linux/linux3050b99850247695cb07a5c15265afcc08bcf40070518f3aaf5a059b691867d7d2d46b999319656a+4
debiandebian/linux< linux 6.1.55-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53539: In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix incomplete state save in rxe_requester If a send packet is dropped b2025-10-04
GHSA
GHSA-v36f-cm3w-p7vq: In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix incomplete state save in rxe_requester If a send packet is dropped2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: RDMA/rxe: Fix incomplete state save in rxe_requester2025-10-04
Debian
CVE-2023-53539: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: F...2023