CVE-2023-54048

Source
https://cve.org/CVERecord?id=CVE-2023-54048
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54048.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54048
Downstream
Related
Published
2025-12-24T12:22:58.910Z
Modified
2026-03-11T07:44:59.235316859Z
Summary
RDMA/bnxt_re: Prevent handling any completions after qp destroy
Details

In the Linux kernel, the following vulnerability has been resolved:

RDMA/bnxt_re: Prevent handling any completions after qp destroy

HW may generate completions that indicates QP is destroyed. Driver should not be scheduling any more completion handlers for this QP, after the QP is destroyed. Since CQs are active during the QP destroy, driver may still schedule completion handlers. This can cause a race where the destroycq and pollcq running simultaneously.

Snippet of kernel panic while doing bnxt_re driver load unload in loop. This indicates a poll after the CQ is freed. 

[77786.481636] Call Trace: [77786.481640]  <TASK> [77786.481644]  bnxtrepollcq+0x14a/0x620 [bnxtre] [77786.481658]  ? kvmclockread+0x14/0x30 [77786.481693]  __ibprocesscq+0x57/0x190 [ibcore] [77786.481728]  ibcqpollwork+0x26/0x80 [ibcore] [77786.481761]  processonework+0x1e5/0x3f0 [77786.481768]  workerthread+0x50/0x3a0 [77786.481785]  ? __pfxworkerthread+0x10/0x10 [77786.481790]  kthread+0xe2/0x110 [77786.481794]  ? _pfxkthread+0x10/0x10 [77786.481797]  retfromfork+0x2c/0x50

To avoid this, complete all completion handlers before returning the destroy QP. If freecq is called soon after destroyqp, IB stack will cancel the CQ work before invoking the destroy_cq verb and this will prevent any race mentioned.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54048.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1ac5a404797523cedaf424a3aaa3cf8f9548dff8
Fixed
b79a0e71d6e8692e0b6da05f8aaa7d69191cf7e7
Fixed
b8500538b8f5b2cd86b02754c8de83eaa7a2d6ba
Fixed
7faa6097694164380ed19600c7a7993d071270b9
Fixed
b5bbc6551297447d3cca55cf907079e206e9cd82

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54048.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.11.0
Fixed
5.15.124
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.43
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54048.json"