CVE-2023-53525

Source
https://cve.org/CVERecord?id=CVE-2023-53525
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53525.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53525
Downstream
Related
Published
2025-10-01T11:46:11.188Z
Modified
2026-04-11T12:46:48.645805Z
Summary
RDMA/cma: Allow UD qp_type to join multicast only
Details

In the Linux kernel, the following vulnerability has been resolved:

RDMA/cma: Allow UD qp_type to join multicast only

As for multicast: - The SIDR is the only mode that makes sense; - Besides PSUDP, other port spaces like PSIB is also allowed, as it is UD compatible. In this case qkey also needs to be set [1].

This patch allows only UD qp_type to join multicast, and set qkey to default if it's not set, to fix an uninit-value error: the ib->rec.qkey field is accessed without being initialized.

===================================================== BUG: KMSAN: uninit-value in cmasetqkey drivers/infiniband/core/cma.c:510 [inline] BUG: KMSAN: uninit-value in cmamakemcevent+0xb73/0xe00 drivers/infiniband/core/cma.c:4570 cmasetqkey drivers/infiniband/core/cma.c:510 [inline] cmamakemcevent+0xb73/0xe00 drivers/infiniband/core/cma.c:4570 cmaiboejoinmulticast drivers/infiniband/core/cma.c:4782 [inline] rdmajoinmulticast+0x2b83/0x30a0 drivers/infiniband/core/cma.c:4814 ucmaprocessjoin+0xa76/0xf60 drivers/infiniband/core/ucma.c:1479 ucmajoinmulticast+0x1e3/0x250 drivers/infiniband/core/ucma.c:1546 ucmawrite+0x639/0x6d0 drivers/infiniband/core/ucma.c:1732 vfswrite+0x8ce/0x2030 fs/readwrite.c:588 ksyswrite+0x28c/0x520 fs/readwrite.c:643 __dosyswrite fs/read_write.c:655 [inline] __sesyswrite fs/read_write.c:652 [inline] __ia32syswrite+0xdb/0x120 fs/read_write.c:652 dosyscall32irqson arch/x86/entry/common.c:114 [inline] __dofastsyscall32+0x96/0xf0 arch/x86/entry/common.c:180 dofastsyscall32+0x34/0x70 arch/x86/entry/common.c:205 doSYSENTER32+0x1b/0x20 arch/x86/entry/common.c:248 entrySYSENTERcompatafterhwframe+0x4d/0x5c

Local variable ib.i created at: cmaiboejoinmulticast drivers/infiniband/core/cma.c:4737 [inline] rdmajoinmulticast+0x586/0x30a0 drivers/infiniband/core/cma.c:4814 ucmaprocess_join+0xa76/0xf60 drivers/infiniband/core/ucma.c:1479

CPU: 0 PID: 29874 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0

Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011

[1] https://lore.kernel.org/linux-rdma/20220117183832.GD84788@nvidia.com/

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53525.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b5de0c60cc30c2a3513c7188c73f3f29acc29234
Fixed
ae11498851423d6de27aebfe12a5ee85060ab1d5
Fixed
48e8e7851dc0b1584d83817a78fc7108c8904b54
Fixed
02eabb635bc64bd1e3a7cf887d6d182bffb64b99
Fixed
bb18b9dbac2bbdf7695e0bfaac4bf944ff7b207d
Fixed
58e84f6b3e84e46524b7e5a916b53c1ad798bc8f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
b8d1adbff983be0b54f61c9a4169609d7fab0620
Last affected
feed39c8d1282279fcb30612aa0e8d2635c11280

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53525.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.10.0
Fixed
5.10.178
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.108
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.25
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.12

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53525.json"