CVE-2023-53539
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/10/2025
Last modified:
21/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
RDMA/rxe: Fix incomplete state save in rxe_requester<br />
<br />
If a send packet is dropped by the IP layer in rxe_requester()<br />
the call to rxe_xmit_packet() can fail with err == -EAGAIN.<br />
To recover, the state of the wqe is restored to the state before<br />
the packet was sent so it can be resent. However, the routines<br />
that save and restore the state miss a significnt part of the<br />
variable state in the wqe, the dma struct which is used to process<br />
through the sge table. And, the state is not saved before the packet<br />
is built which modifies the dma struct.<br />
<br />
Under heavy stress testing with many QPs on a fast node sending<br />
large messages to a slow node dropped packets are observed and<br />
the resent packets are corrupted because the dma struct was not<br />
restored. This patch fixes this behavior and allows the test cases<br />
to succeed.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.8.1 (including) | 6.1.53 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.4.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.5 (including) | 6.5.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:4.8:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.8:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.8:rc8:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



