CVE-2023-54274
Null Pointer Dereference in Linux srpt RDMA MAD Agent Unregistration
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's srpt module related to RDMA. When unregistering a MAD agent, the code checks if the 'mad_agent' pointer is non-null before calling ib_unregister_mad_agent(). However, this check can mistakenly pass if 'mad_agent' holds an error value rather than a valid pointer. This situation can occur briefly when srpt_add_one() and srpt_remove_one() run simultaneously. The issue can cause a kernel NULL pointer dereference, leading to a system crash or instability. The fix involved adding a proper valid pointer check before unregistering the MAD agent.
How can this vulnerability impact me? :
This vulnerability can cause a kernel NULL pointer dereference, which may lead to system crashes or instability when the srpt module unregisters a MAD agent, especially during simultaneous execution of certain functions. This can affect system reliability and availability, potentially causing downtime or requiring a reboot.