CVE-2023-54274

Source
https://cve.org/CVERecord?id=CVE-2023-54274
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54274.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54274
Downstream
Related
Published
2025-12-30T12:16:03.696Z
Modified
2026-03-11T07:54:07.720739Z
Summary
RDMA/srpt: Add a check for valid 'mad_agent' pointer
Details

In the Linux kernel, the following vulnerability has been resolved:

RDMA/srpt: Add a check for valid 'mad_agent' pointer

When unregistering MAD agent, srpt module has a non-null check for 'madagent' pointer before invoking ibunregistermadagent(). This check can pass if 'madagent' variable holds an error value. The 'madagent' can have an error value for a short window when srptaddone() and srptremoveone() is executed simultaneously.

In srpt module, added a valid pointer check for 'sport->mad_agent' before unregistering MAD agent.

This issue can hit when RoCE driver unregisters ib_device

Stack Trace:

BUG: kernel NULL pointer dereference, address: 000000000000004d PGD 145003067 P4D 145003067 PUD 2324fe067 PMD 0 Oops: 0002 [#1] PREEMPT SMP NOPTI CPU: 10 PID: 4459 Comm: kworker/u80:0 Kdump: loaded Tainted: P Hardware name: Dell Inc. PowerEdge R640/06NR82, BIOS 2.5.4 01/13/2020 Workqueue: bnxtre bnxtretask [bnxtre] RIP: 0010:rawspinlockirqsave+0x19/0x40 Call Trace: ibunregistermadagent+0x46/0x2f0 [ibcore] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready ? __schedule+0x20b/0x560 srptunregistermadagent+0x93/0xd0 [ibsrpt] srptremoveone+0x20/0x150 [ibsrpt] removeclientcontext+0x88/0xd0 [ibcore] bond0: (slave p2p1): link status definitely up, 100000 Mbps full duplex disabledevice+0x8a/0x160 [ibcore] bond0: active interface up! ? kernfsnamehash+0x12/0x80 (NULL device *): Bonding Info Received: rdev: 000000006c0b8247 _ibunregisterdevice+0x42/0xb0 [ibcore] (NULL device *): Master: mode: 4 numslaves:2 ibunregisterdevice+0x22/0x30 [ibcore] (NULL device *): Slave: id: 105069936 name:p2p1 link:0 state:0 bnxtrestopqpsandibuninit+0x83/0x90 [bnxtre] bnxtrealloclag+0x12e/0x4e0 [bnxtre]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54274.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a42d985bd5b234da8b61347a78dc3057bf7bb94d
Fixed
8ec6acdb9b6a80eeb13e778dfedb5d72a88f14fe
Fixed
00cc21e32ea1b8ebbabf5d645da9378d986bf8ba
Fixed
4323aaedeba32076e652aad056afd7885bb96bb7
Fixed
5f6ef2a574b0e0e0ea46ed0022575442df9d0bf9
Fixed
b713623bfef8cb1df9c769a3887fa10db63d1c54
Fixed
eca5cd9474cd26d62f9756f536e2e656d3f62f3a

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54274.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.3.0
Fixed
5.10.180
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.111
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.28
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.15
Type
ECOSYSTEM
Events
Introduced
6.3.0
Fixed
6.3.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54274.json"