CVE-2023-53110
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
02/05/2025
Last modified:
02/05/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/smc: fix NULL sndbuf_desc in smc_cdc_tx_handler()<br />
<br />
When performing a stress test on SMC-R by rmmod mlx5_ib driver<br />
during the wrk/nginx test, we found that there is a probability<br />
of triggering a panic while terminating all link groups.<br />
<br />
This issue dues to the race between smc_smcr_terminate_all()<br />
and smc_buf_create().<br />
<br />
smc_smcr_terminate_all<br />
<br />
smc_buf_create<br />
/* init */<br />
conn->sndbuf_desc = NULL;<br />
...<br />
<br />
__smc_lgr_terminate<br />
smc_conn_kill<br />
smc_close_abort<br />
smc_cdc_get_slot_and_msg_send<br />
<br />
__softirqentry_text_start<br />
smc_wr_tx_process_cqe<br />
smc_cdc_tx_handler<br />
READ(conn->sndbuf_desc->len);<br />
/* panic dues to NULL sndbuf_desc */<br />
<br />
conn->sndbuf_desc = xxx;<br />
<br />
This patch tries to fix the issue by always to check the sndbuf_desc<br />
before send any cdc msg, to make sure that no null pointer is<br />
seen during cqe processing.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/22a825c541d775c1dbe7b2402786025acad6727b
- https://git.kernel.org/stable/c/31817c530768b0199771ec6019571b4f0ddbf230
- https://git.kernel.org/stable/c/3c270435db8aa34929263dddae8fd050f5216ecb
- https://git.kernel.org/stable/c/3ebac7cf0a184a8102821a7a00203f02bebda83c
- https://git.kernel.org/stable/c/b108bd9e6be000492ebebe867daa699285978a10