CVE-2023-54028

Source
https://cve.org/CVERecord?id=CVE-2023-54028
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54028.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54028
Downstream
Related
Published
2025-12-24T10:55:56.619Z
Modified
2026-03-20T12:33:24.605594Z
Summary
RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task"
Details

In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix the error "trying to register non-static key in rxecleanuptask"

In the function rxecreateqp(), rxeqpfrominit() is called to initialize qp, internally things like rxeinittask are not setup until rxeqpinitreq().

If an error occurred before this point then the unwind will call rxecleanup() and eventually to rxeqpdocleanup()/rxecleanuptask() which will oops when trying to access the uninitialized spinlock.

If rxeinittask is not executed, rxecleanuptask will not be called.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54028.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8700e3e7c4857d28ebaa824509934556da0b3e76
Fixed
3236221bb8e4de8e3d0c8385f634064fb26b8e38
Fixed
c8473cd5b301279a41dc75e5afb26b3d5223b6c7
Fixed
0d938264fcfe4927e54f0e519da05af1d5d720b4
Fixed
b2b1ddc457458fecd1c6f385baa9fbda5f0c63ad

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54028.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.8.0
Fixed
6.1.32
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.15
Type
ECOSYSTEM
Events
Introduced
6.3.0
Fixed
6.3.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54028.json"