CVE-2023-54274Race Condition within a Thread in Linux

Severity
5.8MEDIUM
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Add a check for valid 'mad_agent' pointer When unregistering MAD agent, srpt module has a non-null check for 'mad_agent' pointer before invoking ib_unregister_mad_agent(). This check can pass if 'mad_agent' variable holds an error value. The 'mad_agent' can have an error value for a short window when srpt_add_one() and srpt_remove_one() is executed simultaneously. In srpt module, added a valid pointer check for 'sp

Affected Packages4 packages

Linuxlinux/linux_kernel3.3.05.10.180+4
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linuxa42d985bd5b234da8b61347a78dc3057bf7bb94d8ec6acdb9b6a80eeb13e778dfedb5d72a88f14fe+6
debiandebian/linux< linux 6.1.37-1 (bookworm)

🔴Vulnerability Details

3
OSV
RDMA/srpt: Add a check for valid 'mad_agent' pointer2025-12-30
OSV
CVE-2023-54274: In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Add a check for valid 'mad_agent' pointer When unregistering MAD agent,2025-12-30
GHSA
GHSA-jwmj-482q-j9c2: In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Add a check for valid 'mad_agent' pointer When unregistering MAD agen2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: RDMA/srpt: Add a check for valid 'mad_agent' pointer2025-12-30
Debian
CVE-2023-54274: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: ...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54274 Impact, Exploitability, and Mitigation Steps | Wiz