In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Collect command failures data only for known commands
DEVX can issue a general command, which is not used by mlx5 driver. In case such command is failed, mlx5 is trying to collect the failure data, However, mlx5 doesn't create a storage for this command, since mlx5 doesn't use it. This lead to array-index-out-of-bounds error.
Fix it by checking whether the command is known before collecting the failure data.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53340.json"
}[
{
"id": "CVE-2023-53340-2c2400a5",
"deprecated": false,
"digest": {
"function_hash": "88018531591203654494504564613510931861",
"length": 449.0
},
"signature_version": "v1",
"target": {
"function": "cmd_status_log",
"file": "drivers/net/ethernet/mellanox/mlx5/core/cmd.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2a0a935fb64ee8af253b9c6133bb6702fb152ac2",
"signature_type": "Function"
},
{
"id": "CVE-2023-53340-83df9884",
"deprecated": false,
"digest": {
"function_hash": "88018531591203654494504564613510931861",
"length": 449.0
},
"signature_version": "v1",
"target": {
"function": "cmd_status_log",
"file": "drivers/net/ethernet/mellanox/mlx5/core/cmd.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d8b6f175235d7327b4e1b13216859e89496dfbd5",
"signature_type": "Function"
},
{
"id": "CVE-2023-53340-a3eefced",
"deprecated": false,
"digest": {
"line_hashes": [
"221680395149123102962038070230864596220",
"331357806714156647888454066432402257605",
"220713388393601148338391206995107810767",
"272396967649216832886006898134822307330",
"48475279718566939772039081835602569963",
"336781010869632382984608091466110505172"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "drivers/net/ethernet/mellanox/mlx5/core/cmd.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d8b6f175235d7327b4e1b13216859e89496dfbd5",
"signature_type": "Line"
},
{
"id": "CVE-2023-53340-aae042a3",
"deprecated": false,
"digest": {
"line_hashes": [
"221680395149123102962038070230864596220",
"331357806714156647888454066432402257605",
"220713388393601148338391206995107810767",
"272396967649216832886006898134822307330",
"48475279718566939772039081835602569963",
"336781010869632382984608091466110505172"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "drivers/net/ethernet/mellanox/mlx5/core/cmd.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2a0a935fb64ee8af253b9c6133bb6702fb152ac2",
"signature_type": "Line"
},
{
"id": "CVE-2023-53340-b36241bc",
"deprecated": false,
"digest": {
"function_hash": "88018531591203654494504564613510931861",
"length": 449.0
},
"signature_version": "v1",
"target": {
"function": "cmd_status_log",
"file": "drivers/net/ethernet/mellanox/mlx5/core/cmd.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@411e4d6caa7f7169192b8dacc8421ac4fd64a354",
"signature_type": "Function"
},
{
"id": "CVE-2023-53340-ea5e8d41",
"deprecated": false,
"digest": {
"line_hashes": [
"221680395149123102962038070230864596220",
"331357806714156647888454066432402257605",
"220713388393601148338391206995107810767",
"272396967649216832886006898134822307330",
"48475279718566939772039081835602569963",
"336781010869632382984608091466110505172"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "drivers/net/ethernet/mellanox/mlx5/core/cmd.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@411e4d6caa7f7169192b8dacc8421ac4fd64a354",
"signature_type": "Line"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53340.json"