CVE-2023-52775

Severity CVSS v4.0:
Pending analysis
Type:
CWE-787 Out-of-bounds Write
Publication date:
21/05/2024
Last modified:
23/09/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/smc: avoid data corruption caused by decline<br /> <br /> We found a data corruption issue during testing of SMC-R on Redis<br /> applications.<br /> <br /> The benchmark has a low probability of reporting a strange error as<br /> shown below.<br /> <br /> "Error: Protocol error, got "\xe2" as reply type byte"<br /> <br /> Finally, we found that the retrieved error data was as follows:<br /> <br /> 0xE2 0xD4 0xC3 0xD9 0x04 0x00 0x2C 0x20 0xA6 0x56 0x00 0x16 0x3E 0x0C<br /> 0xCB 0x04 0x02 0x01 0x00 0x00 0x20 0x00 0x00 0x00 0x00 0x00 0x00 0x00<br /> 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0xE2<br /> <br /> It is quite obvious that this is a SMC DECLINE message, which means that<br /> the applications received SMC protocol message.<br /> We found that this was caused by the following situations:<br /> <br /> client server<br /> ¦ clc proposal<br /> -------------&gt;<br /> ¦ clc accept<br /> <br /> wait llc confirm<br /> send llc confirm<br /> ¦failed llc confirm<br /> ¦ x------<br /> (after 2s)timeout<br /> wait llc confirm rsp<br /> <br /> wait decline<br /> <br /> (after 1s) timeout<br /> (after 2s) timeout<br /> ¦ decline<br /> --------------&gt;<br /> ¦ decline<br />

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.8 (including) 5.10.203 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.141 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.65 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.4 (excluding)
cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:*