CVE-2023-54302 — Improper Locking in Linux
Severity
5.9MEDIUM
No vectorEPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
RDMA/irdma: Fix data race on CQP completion stats
CQP completion statistics is read lockesly in irdma_wait_event and
irdma_check_cqp_progress while it can be updated in the completion
thread irdma_sc_ccq_get_cqe_info on another CPU as KCSAN reports.
Make completion statistics an atomic variable to reflect coherent updates
to it. This will also avoid load/store tearing logic bug potentially
possible by compiler optimizations.
…
Affected Packages4 packages
▶CVEListV5linux/linux915cc7ac0f8e2a23675ee896e87f17c7d3c47089 — bf0f9f65b7fe36ea9d2e23263dcefc90255d7b1f+4
🔴Vulnerability Details
3OSV▶
CVE-2023-54302: In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix data race on CQP completion stats CQP completion statistics is rea↗2025-12-30
GHSA▶
GHSA-h862-m8hq-w46v: In the Linux kernel, the following vulnerability has been resolved:
RDMA/irdma: Fix data race on CQP completion stats
CQP completion statistics is r↗2025-12-30