In the Linux kernel, the following vulnerability has been resolved:
octeontx2-pf: mcs: Fix NULL pointer dereferences
When system is rebooted after creating macsec interface below NULL pointer dereference crashes occurred. This patch fixes those crashes by using correct order of teardown
[ 3324.406942] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 [ 3324.415726] Mem abort info: [ 3324.418510] ESR = 0x96000006 [ 3324.421557] EC = 0x25: DABT (current EL), IL = 32 bits [ 3324.426865] SET = 0, FnV = 0 [ 3324.429913] EA = 0, S1PTW = 0 [ 3324.433047] Data abort info: [ 3324.435921] ISV = 0, ISS = 0x00000006 [ 3324.439748] CM = 0, WnR = 0 .... [ 3324.575915] Call trace: [ 3324.578353] cn10kmdodelsecy+0x24/0x180 [ 3324.582440] macseccommondellink+0xec/0x120 [ 3324.586788] macsecnotify+0x17c/0x1c0 [ 3324.590529] rawnotifiercallchain+0x50/0x70 [ 3324.594965] callnetdevicenotifiersinfo+0x34/0x7c [ 3324.599921] rollbackregisteredmany+0x354/0x5bc [ 3324.604616] unregisternetdevicequeue+0x88/0x10c [ 3324.609399] unregisternetdev+0x20/0x30 [ 3324.613313] otx2remove+0x8c/0x310 [ 3324.616794] pcideviceshutdown+0x30/0x70 [ 3324.620882] device_shutdown+0x11c/0x204
[ 966.664930] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 [ 966.673712] Mem abort info: [ 966.676497] ESR = 0x96000006 [ 966.679543] EC = 0x25: DABT (current EL), IL = 32 bits [ 966.684848] SET = 0, FnV = 0 [ 966.687895] EA = 0, S1PTW = 0 [ 966.691028] Data abort info: [ 966.693900] ISV = 0, ISS = 0x00000006 [ 966.697729] CM = 0, WnR = 0 [ 966.833467] Call trace: [ 966.835904] cn10kmdostop+0x20/0xa0 [ 966.839557] macsecdevstop+0xe8/0x11c [ 966.843384] _devclosemany+0xbc/0x140 [ 966.847298] devclosemany+0x84/0x120 [ 966.851039] rollbackregisteredmany+0x114/0x5bc [ 966.855735] unregisternetdevicemany.part.0+0x14/0xa0 [ 966.860952] unregisternetdevicemany+0x18/0x24 [ 966.865560] macsecnotify+0x1ac/0x1c0 [ 966.869303] rawnotifiercallchain+0x50/0x70 [ 966.873738] callnetdevicenotifiersinfo+0x34/0x7c [ 966.878694] rollbackregisteredmany+0x354/0x5bc [ 966.883390] unregisternetdevicequeue+0x88/0x10c [ 966.888173] unregisternetdev+0x20/0x30 [ 966.892090] otx2remove+0x8c/0x310 [ 966.895571] pcideviceshutdown+0x30/0x70 [ 966.899660] deviceshutdown+0x11c/0x204 [ 966.903574] _dosysreboot+0x208/0x290 [ 966.907487] _arm64sysreboot+0x20/0x30 [ 966.911489] el0svchandler+0x80/0x1c0 [ 966.915316] el0svc+0x8/0x180 [ 966.918362] Code: f9400000 f9400a64 91220014 f94b3403 (f9400060) [ 966.924448] ---[ end trace 341778e799c3d8d7 ]---
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53595.json"
}[
{
"id": "CVE-2023-53595-318a8647",
"deprecated": false,
"digest": {
"function_hash": "161019202355036239741957367742100828377",
"length": 1240.0
},
"signature_version": "v1",
"target": {
"function": "otx2_remove",
"file": "drivers/net/ethernet/marvell/octeontx2/nic/otx2_pf.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@13ff119b17e5e2916435ce01a0156c8698ad9e16",
"signature_type": "Function"
},
{
"id": "CVE-2023-53595-59976116",
"deprecated": false,
"digest": {
"line_hashes": [
"84919538579143357877926019740639310287",
"232736402825612078423858484880722905784",
"132606039809477105392973191019422955997",
"224017871492082176579918760636923075073",
"193471121064035694434329475555358191223",
"296686133842741192313285855039003474226",
"95312203134036981171206205928269338739",
"142222838255656176113884002758274186237"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "drivers/net/ethernet/marvell/octeontx2/nic/otx2_pf.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1152c0f947b76e7731e039185cbd00fdb4389f00",
"signature_type": "Line"
},
{
"id": "CVE-2023-53595-758c5631",
"deprecated": false,
"digest": {
"function_hash": "161019202355036239741957367742100828377",
"length": 1240.0
},
"signature_version": "v1",
"target": {
"function": "otx2_remove",
"file": "drivers/net/ethernet/marvell/octeontx2/nic/otx2_pf.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@699af748c61574125d269db260dabbe20436d74e",
"signature_type": "Function"
},
{
"id": "CVE-2023-53595-761d277c",
"deprecated": false,
"digest": {
"function_hash": "161019202355036239741957367742100828377",
"length": 1240.0
},
"signature_version": "v1",
"target": {
"function": "otx2_remove",
"file": "drivers/net/ethernet/marvell/octeontx2/nic/otx2_pf.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1152c0f947b76e7731e039185cbd00fdb4389f00",
"signature_type": "Function"
},
{
"id": "CVE-2023-53595-91e4184d",
"deprecated": false,
"digest": {
"line_hashes": [
"84919538579143357877926019740639310287",
"232736402825612078423858484880722905784",
"132606039809477105392973191019422955997",
"224017871492082176579918760636923075073",
"193471121064035694434329475555358191223",
"296686133842741192313285855039003474226",
"95312203134036981171206205928269338739",
"142222838255656176113884002758274186237"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "drivers/net/ethernet/marvell/octeontx2/nic/otx2_pf.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@699af748c61574125d269db260dabbe20436d74e",
"signature_type": "Line"
},
{
"id": "CVE-2023-53595-d0ad3268",
"deprecated": false,
"digest": {
"line_hashes": [
"84919538579143357877926019740639310287",
"232736402825612078423858484880722905784",
"132606039809477105392973191019422955997",
"224017871492082176579918760636923075073",
"193471121064035694434329475555358191223",
"296686133842741192313285855039003474226",
"95312203134036981171206205928269338739",
"142222838255656176113884002758274186237"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "drivers/net/ethernet/marvell/octeontx2/nic/otx2_pf.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a3dcc45eca017fca82ac47dbde6f41af960657e5",
"signature_type": "Line"
},
{
"id": "CVE-2023-53595-dbb1c062",
"deprecated": false,
"digest": {
"function_hash": "161019202355036239741957367742100828377",
"length": 1240.0
},
"signature_version": "v1",
"target": {
"function": "otx2_remove",
"file": "drivers/net/ethernet/marvell/octeontx2/nic/otx2_pf.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a3dcc45eca017fca82ac47dbde6f41af960657e5",
"signature_type": "Function"
},
{
"id": "CVE-2023-53595-eb13195a",
"deprecated": false,
"digest": {
"line_hashes": [
"84919538579143357877926019740639310287",
"232736402825612078423858484880722905784",
"132606039809477105392973191019422955997",
"224017871492082176579918760636923075073",
"193471121064035694434329475555358191223",
"296686133842741192313285855039003474226",
"95312203134036981171206205928269338739",
"142222838255656176113884002758274186237"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "drivers/net/ethernet/marvell/octeontx2/nic/otx2_pf.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@13ff119b17e5e2916435ce01a0156c8698ad9e16",
"signature_type": "Line"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53595.json"