CVE-2023-53539
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-04

Last updated on: 2026-03-21

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix incomplete state save in rxe_requester If a send packet is dropped by the IP layer in rxe_requester() the call to rxe_xmit_packet() can fail with err == -EAGAIN. To recover, the state of the wqe is restored to the state before the packet was sent so it can be resent. However, the routines that save and restore the state miss a significnt part of the variable state in the wqe, the dma struct which is used to process through the sge table. And, the state is not saved before the packet is built which modifies the dma struct. Under heavy stress testing with many QPs on a fast node sending large messages to a slow node dropped packets are observed and the resent packets are corrupted because the dma struct was not restored. This patch fixes this behavior and allows the test cases to succeed.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-04
Last Modified
2026-03-21
Generated
2026-05-07
AI Q&A
2025-10-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
linux linux_kernel 4.8
linux linux_kernel 4.8
linux linux_kernel From 6.5 (inc) to 6.5.3 (exc)
linux linux_kernel From 6.2 (inc) to 6.4.16 (exc)
linux linux_kernel From 4.8.1 (inc) to 6.1.53 (exc)
linux linux_kernel 4.8
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is in the Linux kernel's RDMA rxe_requester component. When a send packet is dropped by the IP layer, the system tries to resend the packet by restoring the state of the work queue element (wqe) to its state before sending. However, the code that saves and restores this state misses an important part called the dma struct, which is used to process data through the scatter-gather entry (sge) table. Because the dma struct is not properly saved and restored, resent packets can become corrupted under heavy load conditions. This patch fixes the issue by correctly saving and restoring the dma struct state.


How can this vulnerability impact me? :

This vulnerability can cause data corruption in resent packets when the system is under heavy stress with many queue pairs sending large messages. This means that communication over RDMA using the rxe_requester may be unreliable, leading to corrupted data being transmitted, which can affect the integrity and reliability of applications relying on this communication.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart