CVE-2023-53110

Source
https://cve.org/CVERecord?id=CVE-2023-53110
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53110.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53110
Downstream
Published
2025-05-02T15:55:50.367Z
Modified
2026-03-12T03:27:59.868495Z
Summary
net/smc: fix NULL sndbuf_desc in smc_cdc_tx_handler()
Details

In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix NULL sndbufdesc in smccdctxhandler()

When performing a stress test on SMC-R by rmmod mlx5_ib driver during the wrk/nginx test, we found that there is a probability of triggering a panic while terminating all link groups.

This issue dues to the race between smcsmcrterminateall() and smcbuf_create().

        smc_smcr_terminate_all

smcbufcreate /* init */ conn->sndbuf_desc = NULL; ...

        __smc_lgr_terminate
            smc_conn_kill
                smc_close_abort
                    smc_cdc_get_slot_and_msg_send

        __softirqentry_text_start
            smc_wr_tx_process_cqe
                smc_cdc_tx_handler
                    READ(conn->sndbuf_desc->len);
                    /* panic dues to NULL sndbuf_desc */

conn->sndbuf_desc = xxx;

This patch tries to fix the issue by always to check the sndbuf_desc before send any cdc msg, to make sure that no null pointer is seen during cqe processing.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53110.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0b29ec6436138721acf5844e558f7334a0fa61d5
Fixed
31817c530768b0199771ec6019571b4f0ddbf230
Fixed
b108bd9e6be000492ebebe867daa699285978a10
Fixed
3c270435db8aa34929263dddae8fd050f5216ecb
Fixed
3ebac7cf0a184a8102821a7a00203f02bebda83c
Fixed
22a825c541d775c1dbe7b2402786025acad6727b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53110.json"