CVE-2023-52513

Source
https://cve.org/CVERecord?id=CVE-2023-52513
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52513.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52513
Downstream
Related
Published
2024-03-02T21:52:24.587Z
Modified
2026-03-20T12:32:35.651756Z
Summary
RDMA/siw: Fix connection failure handling
Details

In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Fix connection failure handling

In case immediate MPA request processing fails, the newly created endpoint unlinks the listening endpoint and is ready to be dropped. This special case was not handled correctly by the code handling the later TCP socket close, causing a NULL dereference crash in siwcmwork_handler() when dereferencing a NULL listener. We now also cancel the useless MPA timeout, if immediate MPA request processing fails.

This patch furthermore simplifies MPA processing in general: Scheduling a useless TCP socket read in skdataready() upcall is now surpressed, if the socket is already moved out of TCP_ESTABLISHED state.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52513.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6c52fdc244b5ccc468006fd65a504d4ee33743c7
Fixed
6e26812e289b374c17677d238164a5a8f5770594
Fixed
0d520cdb0cd095eac5d00078dfd318408c9b5eed
Fixed
81b7bf367eea795d259d0261710c6a89f548844d
Fixed
5cf38e638e5d01b68f9133968a85e8b3fd1ecf2f
Fixed
eeafc50a77f6a783c2c44e7ec3674a7b693e06f8
Fixed
53a3f777049771496f791504e7dc8ef017cba590

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52513.json"