CVE-2023-54274 — Race Condition within a Thread in Linux
Severity
5.8MEDIUM
No vectorEPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
RDMA/srpt: Add a check for valid 'mad_agent' pointer
When unregistering MAD agent, srpt module has a non-null check
for 'mad_agent' pointer before invoking ib_unregister_mad_agent().
This check can pass if 'mad_agent' variable holds an error value.
The 'mad_agent' can have an error value for a short window when
srpt_add_one() and srpt_remove_one() is executed simultaneously.
In srpt module, added a valid pointer check for 'sp…
Affected Packages4 packages
▶CVEListV5linux/linuxa42d985bd5b234da8b61347a78dc3057bf7bb94d — 8ec6acdb9b6a80eeb13e778dfedb5d72a88f14fe+6
🔴Vulnerability Details
3OSV▶
CVE-2023-54274: In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Add a check for valid 'mad_agent' pointer When unregistering MAD agent,↗2025-12-30
GHSA▶
GHSA-jwmj-482q-j9c2: In the Linux kernel, the following vulnerability has been resolved:
RDMA/srpt: Add a check for valid 'mad_agent' pointer
When unregistering MAD agen↗2025-12-30