CVE-2023-52782

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-52782
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52782.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52782
Downstream
Related
Published
2024-05-21T15:31:00Z
Modified
2025-10-15T04:22:31.204243Z
Summary
net/mlx5e: Track xmit submission to PTP WQ after populating metadata map
Details

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Track xmit submission to PTP WQ after populating metadata map

Ensure the skb is available in metadata mapping to skbs before tracking the metadata index for detecting undelivered CQEs. If the metadata index is put in the tracking list before putting the skb in the map, the metadata index might be used for detecting undelivered CQEs before the relevant skb is available in the map, which can lead to a null-ptr-deref.

Log: general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f] CPU: 0 PID: 1243 Comm: kworker/0:2 Not tainted 6.6.0-rc4+ #108 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 Workqueue: events mlx5erxdimwork [mlx5core] RIP: 0010:mlx5eptpnapipoll+0x9a4/0x2290 [mlx5core] Code: 8c 24 38 cc ff ff 4c 8d 3c c1 4c 89 f9 48 c1 e9 03 42 80 3c 31 00 0f 85 97 0f 00 00 4d 8b 3f 49 8d 7f 28 48 89 f9 48 c1 e9 03 <42> 80 3c 31 00 0f 85 8b 0f 00 00 49 8b 47 28 48 85 c0 0f 84 05 07 RSP: 0018:ffff8884d3c09c88 EFLAGS: 00010206 RAX: 0000000000000069 RBX: ffff8881160349d8 RCX: 0000000000000005 RDX: ffffed10218f48cf RSI: 0000000000000004 RDI: 0000000000000028 RBP: ffff888122707700 R08: 0000000000000001 R09: ffffed109a781383 R10: 0000000000000003 R11: 0000000000000003 R12: ffff88810c7a7a40 R13: ffff888122707700 R14: dffffc0000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8884d3c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f4f878dd6e0 CR3: 000000014d108002 CR4: 0000000000370eb0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <IRQ> ? dieaddr+0x3c/0xa0 ? excgeneralprotection+0x144/0x210 ? asmexcgeneralprotection+0x22/0x30 ? mlx5eptpnapipoll+0x9a4/0x2290 [mlx5core] ? mlx5eptpnapipoll+0x8f6/0x2290 [mlx5core] napipoll.constprop.0+0xa4/0x580 netrxaction+0x460/0xb80 ? _rawspinunlockirqrestore+0x32/0x60 ? _napipoll.constprop.0+0x580/0x580 ? taskletactioncommon.isra.0+0x2ef/0x760 _dosoftirq+0x26c/0x827 irqexitrcu+0xc2/0x100 commoninterrupt+0x7f/0xa0 </IRQ> <TASK> asmcommoninterrupt+0x22/0x40 RIP: 0010:kmemcacheallocnode+0xb/0x330 Code: 41 5d 41 5e 41 5f c3 8b 44 24 14 8b 4c 24 10 09 c8 eb d5 e8 b7 43 ca 01 0f 1f 80 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 <41> 56 41 89 d6 41 55 41 89 f5 41 54 49 89 fc 53 48 83 e4 f0 48 83 RSP: 0018:ffff88812c4079c0 EFLAGS: 00000246 RAX: 1ffffffff083c7fe RBX: ffff888100042dc0 RCX: 0000000000000218 RDX: 00000000ffffffff RSI: 0000000000000dc0 RDI: ffff888100042dc0 RBP: ffff88812c4079c8 R08: ffffffffa0289f96 R09: ffffed1025880ea9 R10: ffff888138839f80 R11: 0000000000000002 R12: 0000000000000dc0 R13: 0000000000000100 R14: 000000000000008c R15: ffff8881271fc450 ? cmdexec+0x796/0x2200 [mlx5core] kmalloctrace+0x26/0xc0 cmdexec+0x796/0x2200 [mlx5core] mlx5cmddo+0x22/0xc0 [mlx5core] mlx5cmdexec+0x17/0x30 [mlx5core] mlx5coremodifycqmoderation+0x139/0x1b0 [mlx5core] ? mlx5addcqtotasklet+0x280/0x280 [mlx5core] ? lockdepsetlockcmpfn+0x190/0x190 ? processonework+0x659/0x1220 mlx5erxdimwork+0x9d/0x100 [mlx5core] processonework+0x730/0x1220 ? lockdephardirqsonprepare+0x400/0x400 ? maxactivestore+0xf0/0xf0 ? assignwork+0x168/0x240 workerthread+0x70f/0x12d0 ? _kthreadparkme+0xd1/0x1d0 ? processonework+0x1220/0x1220 kthread+0x2d9/0x3b0 ? kthreadcompleteandexit+0x20/0x20 retfromfork+0x2d/0x70 ? kthreadcompleteandexit+0x20/0x20 retfromfork_as ---truncated---

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e729382c297e2c492ff2a260aa1f23183eadae2e
Fixed
a9d6c0c5a6bd9ca88e964f8843ea41bc085de866
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3178308ad4ca38955cad684d235153d4939f1fcd
Fixed
4d510506b46504664eacf8a44a9e8f3e54c137b8
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3178308ad4ca38955cad684d235153d4939f1fcd
Fixed
7e3f3ba97e6cc6fce5bf62df2ca06c8e59040167

Affected versions

v6.*

v6.5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.2

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.6.0
Fixed
6.6.3