In the Linux kernel, the following vulnerability has been resolved:
net/smc: fix NULL sndbufdesc in smccdctxhandler()
When performing a stress test on SMC-R by rmmod mlx5_ib driver during the wrk/nginx test, we found that there is a probability of triggering a panic while terminating all link groups.
This issue dues to the race between smcsmcrterminateall() and smcbuf_create().
smc_smcr_terminate_all
smcbufcreate /* init */ conn->sndbuf_desc = NULL; ...
__smc_lgr_terminate
smc_conn_kill
smc_close_abort
smc_cdc_get_slot_and_msg_send
__softirqentry_text_start
smc_wr_tx_process_cqe
smc_cdc_tx_handler
READ(conn->sndbuf_desc->len);
/* panic dues to NULL sndbuf_desc */
conn->sndbuf_desc = xxx;
This patch tries to fix the issue by always to check the sndbuf_desc before send any cdc msg, to make sure that no null pointer is seen during cqe processing.
[
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"203929131872511551734415379423715728469",
"268875962124134529432738170704013447863",
"171669778014642015603045057525093913003"
]
},
"signature_type": "Line",
"id": "CVE-2023-53110-01c3c9a5",
"target": {
"file": "net/smc/smc_cdc.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3ebac7cf0a184a8102821a7a00203f02bebda83c",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"203929131872511551734415379423715728469",
"268875962124134529432738170704013447863",
"171669778014642015603045057525093913003"
]
},
"signature_type": "Line",
"id": "CVE-2023-53110-2a0afc9a",
"target": {
"file": "net/smc/smc_cdc.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@31817c530768b0199771ec6019571b4f0ddbf230",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"length": 662.0,
"function_hash": "327369073598852750983507496085995896527"
},
"signature_type": "Function",
"id": "CVE-2023-53110-38e4f014",
"target": {
"file": "net/smc/smc_cdc.c",
"function": "smc_cdc_msg_send"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@22a825c541d775c1dbe7b2402786025acad6727b",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"length": 662.0,
"function_hash": "327369073598852750983507496085995896527"
},
"signature_type": "Function",
"id": "CVE-2023-53110-47ff1211",
"target": {
"file": "net/smc/smc_cdc.c",
"function": "smc_cdc_msg_send"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3ebac7cf0a184a8102821a7a00203f02bebda83c",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"203929131872511551734415379423715728469",
"268875962124134529432738170704013447863",
"171669778014642015603045057525093913003"
]
},
"signature_type": "Line",
"id": "CVE-2023-53110-70902c04",
"target": {
"file": "net/smc/smc_cdc.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3c270435db8aa34929263dddae8fd050f5216ecb",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"203929131872511551734415379423715728469",
"268875962124134529432738170704013447863",
"171669778014642015603045057525093913003"
]
},
"signature_type": "Line",
"id": "CVE-2023-53110-74d5e2f9",
"target": {
"file": "net/smc/smc_cdc.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b108bd9e6be000492ebebe867daa699285978a10",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"203929131872511551734415379423715728469",
"268875962124134529432738170704013447863",
"171669778014642015603045057525093913003"
]
},
"signature_type": "Line",
"id": "CVE-2023-53110-a3ad6515",
"target": {
"file": "net/smc/smc_cdc.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@22a825c541d775c1dbe7b2402786025acad6727b",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"length": 662.0,
"function_hash": "327369073598852750983507496085995896527"
},
"signature_type": "Function",
"id": "CVE-2023-53110-e0121d66",
"target": {
"file": "net/smc/smc_cdc.c",
"function": "smc_cdc_msg_send"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b108bd9e6be000492ebebe867daa699285978a10",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"length": 662.0,
"function_hash": "327369073598852750983507496085995896527"
},
"signature_type": "Function",
"id": "CVE-2023-53110-e2b806f4",
"target": {
"file": "net/smc/smc_cdc.c",
"function": "smc_cdc_msg_send"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@31817c530768b0199771ec6019571b4f0ddbf230",
"deprecated": false
},
{
"signature_version": "v1",
"digest": {
"length": 662.0,
"function_hash": "327369073598852750983507496085995896527"
},
"signature_type": "Function",
"id": "CVE-2023-53110-eec5d875",
"target": {
"file": "net/smc/smc_cdc.c",
"function": "smc_cdc_msg_send"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3c270435db8aa34929263dddae8fd050f5216ecb",
"deprecated": false
}
]