CVE-2023-53539
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
04/10/2025
Última modificación:
09/02/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
RDMA/rxe: Fix incomplete state save in rxe_requester<br />
<br />
If a send packet is dropped by the IP layer in rxe_requester()<br />
the call to rxe_xmit_packet() can fail with err == -EAGAIN.<br />
To recover, the state of the wqe is restored to the state before<br />
the packet was sent so it can be resent. However, the routines<br />
that save and restore the state miss a significnt part of the<br />
variable state in the wqe, the dma struct which is used to process<br />
through the sge table. And, the state is not saved before the packet<br />
is built which modifies the dma struct.<br />
<br />
Under heavy stress testing with many QPs on a fast node sending<br />
large messages to a slow node dropped packets are observed and<br />
the resent packets are corrupted because the dma struct was not<br />
restored. This patch fixes this behavior and allows the test cases<br />
to succeed.
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.8.1 (incluyendo) | 6.1.53 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (incluyendo) | 6.4.16 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.5 (incluyendo) | 6.5.3 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:4.8:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.8:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.8:rc8:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



