🔐 CVE Alert

CVE-2023-54048

UNKNOWN 0.0

RDMA/bnxt_re: Prevent handling any completions after qp destroy

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Prevent handling any completions after qp destroy HW may generate completions that indicates QP is destroyed. Driver should not be scheduling any more completion handlers for this QP, after the QP is destroyed. Since CQs are active during the QP destroy, driver may still schedule completion handlers. This can cause a race where the destroy_cq and poll_cq running simultaneously. Snippet of kernel panic while doing bnxt_re driver load unload in loop. This indicates a poll after the CQ is freed.  [77786.481636] Call Trace: [77786.481640]  <TASK> [77786.481644]  bnxt_re_poll_cq+0x14a/0x620 [bnxt_re] [77786.481658]  ? kvm_clock_read+0x14/0x30 [77786.481693]  __ib_process_cq+0x57/0x190 [ib_core] [77786.481728]  ib_cq_poll_work+0x26/0x80 [ib_core] [77786.481761]  process_one_work+0x1e5/0x3f0 [77786.481768]  worker_thread+0x50/0x3a0 [77786.481785]  ? __pfx_worker_thread+0x10/0x10 [77786.481790]  kthread+0xe2/0x110 [77786.481794]  ? __pfx_kthread+0x10/0x10 [77786.481797]  ret_from_fork+0x2c/0x50 To avoid this, complete all completion handlers before returning the destroy QP. If free_cq is called soon after destroy_qp, IB stack will cancel the CQ work before invoking the destroy_cq verb and this will prevent any race mentioned.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 24, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Linux / Linux
1ac5a404797523cedaf424a3aaa3cf8f9548dff8 < b79a0e71d6e8692e0b6da05f8aaa7d69191cf7e7 1ac5a404797523cedaf424a3aaa3cf8f9548dff8 < b8500538b8f5b2cd86b02754c8de83eaa7a2d6ba 1ac5a404797523cedaf424a3aaa3cf8f9548dff8 < 7faa6097694164380ed19600c7a7993d071270b9 1ac5a404797523cedaf424a3aaa3cf8f9548dff8 < b5bbc6551297447d3cca55cf907079e206e9cd82
Linux / Linux
4.11

References

NVD ↗ CVE.org ↗ EPSS Data ↗
git.kernel.org: https://git.kernel.org/stable/c/b79a0e71d6e8692e0b6da05f8aaa7d69191cf7e7 git.kernel.org: https://git.kernel.org/stable/c/b8500538b8f5b2cd86b02754c8de83eaa7a2d6ba git.kernel.org: https://git.kernel.org/stable/c/7faa6097694164380ed19600c7a7993d071270b9 git.kernel.org: https://git.kernel.org/stable/c/b5bbc6551297447d3cca55cf907079e206e9cd82