VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54028

CVE-2023-54028

Description

In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task"

In the function rxe_create_qp(), rxe_qp_from_init() is called to initialize qp, internally things like rxe_init_task are not setup until rxe_qp_init_req().

If an error occurred before this point then the unwind will call rxe_cleanup() and eventually to rxe_qp_do_cleanup()/rxe_cleanup_task() which will oops when trying to access the uninitialized spinlock.

If rxe_init_task is not executed, rxe_cleanup_task will not be called.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Linux kernel RDMA/rxe driver can panic on QP creation error due to uninitialized spinlock access in cleanup path.

In the Linux kernel's RDMA/rxe driver, a bug exists in the QP (Queue Pair) creation process. When rxe_create_qp() calls rxe_qp_from_init(), the QP initialization proceeds through several steps, including rxe_init_task which sets up internal structures like spinlocks. However, if an error occurs before rxe_init_task completes, the cleanup routine rxe_cleanup_task is still invoked, attempting to access a spinlock that has not been initialized. This leads to a kernel panic with the error 'trying to register non-static key'.

Exploitation requires triggering a specific error during QP creation before the spinlock initialization. The attacker must have the ability to create QP objects via the RDMA subsystem, which typically requires local access or sufficient privileges to interact with RDMA devices. No network-based attack vector is involved; it is a local vulnerability.

The impact is a system crash (denial of service) due to the kernel panic. The attacker does not gain privilege escalation or data access, but can cause a denial of service condition.

The fix is included in the Linux kernel stable commit referenced in [1]. Users should apply the patch to prevent this issue. The kernel version affected includes those prior to the commit that ensures rxe_cleanup_task is only called if rxe_init_task has been executed.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.