CVE-2023-54318Race Condition within a Thread in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 92.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add While doing smcr_port_add, there maybe linkgroup add into or delete from smc_lgr_list.list at the same time, which may result kernel crash. So, use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add. The crash calltrace show below: BUG: kernel NULL pointer dereference, address: 0000000000000000 PGD 0 P4D 0 Oops: 0000 [#1]

Affected Packages4 packages

Linuxlinux/linux_kernel5.8.05.10.195+3
Debianlinux/linux_kernel< 5.10.197-1+3
CVEListV5linux/linux1f90a05d9ff907c70456e7c9d7058372679a88c6d1c6c93c27a4bf48006ab16cd9b38d85559d7645+5
debiandebian/linux< linux 6.1.55-1 (bookworm)

🔴Vulnerability Details

3
OSV
net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add2025-12-30
OSV
CVE-2023-54318: In the Linux kernel, the following vulnerability has been resolved: net/smc: use smc_lgr_list2025-12-30
GHSA
GHSA-7984-m77j-cx8w: In the Linux kernel, the following vulnerability has been resolved: net/smc: use smc_lgr_list2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add2025-12-30
Debian
CVE-2023-54318: linux - In the Linux kernel, the following vulnerability has been resolved: net/smc: us...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54318 Impact, Exploitability, and Mitigation Steps | Wiz