{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T00:48:55.755","vulnerabilities":[{"cve":{"id":"CVE-2023-52513","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2024-03-02T22:15:47.730","lastModified":"2024-12-11T15:12:45.753","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/siw: Fix connection failure handling\n\nIn case immediate MPA request processing fails, the newly\ncreated endpoint unlinks the listening endpoint and is\nready to be dropped. This special case was not handled\ncorrectly by the code handling the later TCP socket close,\ncausing a NULL dereference crash in siw_cm_work_handler()\nwhen dereferencing a NULL listener. We now also cancel\nthe useless MPA timeout, if immediate MPA request\nprocessing fails.\n\nThis patch furthermore simplifies MPA processing in general:\nScheduling a useless TCP socket read in sk_data_ready() upcall\nis now surpressed, if the socket is already moved out of\nTCP_ESTABLISHED state."},{"lang":"es","value":"En el kernel de Linux, se resolvió la siguiente vulnerabilidad: RDMA/siw: soluciona el manejo de fallas de conexión En caso de que falle el procesamiento inmediato de la solicitud MPA, el endpoint recién creado desvincula el endpoint de escucha y está listo para ser descartado. Este caso especial no fue manejado correctamente por el código que maneja el cierre posterior del socket TCP, lo que provocó un bloqueo de desreferencia NULL en siw_cm_work_handler() al desreferenciar un oyente NULL. Ahora también cancelamos el tiempo de espera inútil de MPA, si falla el procesamiento inmediato de la solicitud de MPA. Este parche además simplifica el procesamiento MPA en general: la programación de una lectura de socket TCP inútil en la llamada ascendente sk_data_ready() ahora se suprime, si el socket ya se ha movido fuera del estado TCP_ESTABLISHED."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-476"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3","versionEndExcluding":"5.4.258","matchCriteriaId":"CF26BF0D-ECCD-4314-A773-76DC9A15EA98"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.10.198","matchCriteriaId":"66D916C3-4087-44FF-9CD9-D2826BCC9E3D"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"5.15.135","matchCriteriaId":"53447712-3158-498E-A077-9FA1898E6464"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.1.57","matchCriteriaId":"8629E5D1-351D-4D4B-8D05-E10BD4A1CFD0"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2","versionEndExcluding":"6.5.7","matchCriteriaId":"830A824C-F212-4FDC-ADEF-0EBEC6B2365B"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*","matchCriteriaId":"84267A4F-DBC2-444F-B41D-69E15E1BEC97"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*","matchCriteriaId":"FB440208-241C-4246-9A83-C1715C0DAA6C"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*","matchCriteriaId":"0DC421F1-3D5A-4BEF-BF76-4E468985D20B"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*","matchCriteriaId":"00AB783B-BE05-40E8-9A55-6AA457D95031"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/0d520cdb0cd095eac5d00078dfd318408c9b5eed","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/53a3f777049771496f791504e7dc8ef017cba590","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/5cf38e638e5d01b68f9133968a85e8b3fd1ecf2f","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/6e26812e289b374c17677d238164a5a8f5770594","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/81b7bf367eea795d259d0261710c6a89f548844d","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/eeafc50a77f6a783c2c44e7ec3674a7b693e06f8","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/0d520cdb0cd095eac5d00078dfd318408c9b5eed","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/53a3f777049771496f791504e7dc8ef017cba590","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/5cf38e638e5d01b68f9133968a85e8b3fd1ecf2f","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/6e26812e289b374c17677d238164a5a8f5770594","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/81b7bf367eea795d259d0261710c6a89f548844d","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/eeafc50a77f6a783c2c44e7ec3674a7b693e06f8","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}