Bug 2363781 (CVE-2023-53110) - CVE-2023-53110 kernel: net/smc: fix NULL sndbuf_desc in smc_cdc_tx_handler()
Summary: CVE-2023-53110 kernel: net/smc: fix NULL sndbuf_desc in smc_cdc_tx_handler()
Keywords:
Status: NEW
Alias: CVE-2023-53110
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-05-02 16:05 UTC by OSIDB Bzimport
Modified: 2025-05-05 06:20 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-05-02 16:05:28 UTC
In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix NULL sndbuf_desc in smc_cdc_tx_handler()

When performing a stress test on SMC-R by rmmod mlx5_ib driver
during the wrk/nginx test, we found that there is a probability
of triggering a panic while terminating all link groups.

This issue dues to the race between smc_smcr_terminate_all()
and smc_buf_create().

			smc_smcr_terminate_all

smc_buf_create
/* init */
conn->sndbuf_desc = NULL;
...

			__smc_lgr_terminate
				smc_conn_kill
					smc_close_abort
						smc_cdc_get_slot_and_msg_send

			__softirqentry_text_start
				smc_wr_tx_process_cqe
					smc_cdc_tx_handler
						READ(conn->sndbuf_desc->len);
						/* panic dues to NULL sndbuf_desc */

conn->sndbuf_desc = xxx;

This patch tries to fix the issue by always to check the sndbuf_desc
before send any cdc msg, to make sure that no null pointer is
seen during cqe processing.

Comment 1 Avinash Hanwate 2025-05-05 06:09:39 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025050227-CVE-2023-53110-2b28@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.