๐Ÿ” CVE Alert

CVE-2023-54274

UNKNOWN 0.0

RDMA/srpt: Add a check for valid 'mad_agent' pointer

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Add a check for valid 'mad_agent' pointer When unregistering MAD agent, srpt module has a non-null check for 'mad_agent' pointer before invoking ib_unregister_mad_agent(). This check can pass if 'mad_agent' variable holds an error value. The 'mad_agent' can have an error value for a short window when srpt_add_one() and srpt_remove_one() is executed simultaneously. In srpt module, added a valid pointer check for 'sport->mad_agent' before unregistering MAD agent. This issue can hit when RoCE driver unregisters ib_device Stack Trace: ------------ BUG: kernel NULL pointer dereference, address: 000000000000004d PGD 145003067 P4D 145003067 PUD 2324fe067 PMD 0 Oops: 0002 [#1] PREEMPT SMP NOPTI CPU: 10 PID: 4459 Comm: kworker/u80:0 Kdump: loaded Tainted: P Hardware name: Dell Inc. PowerEdge R640/06NR82, BIOS 2.5.4 01/13/2020 Workqueue: bnxt_re bnxt_re_task [bnxt_re] RIP: 0010:_raw_spin_lock_irqsave+0x19/0x40 Call Trace: ib_unregister_mad_agent+0x46/0x2f0 [ib_core] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready ? __schedule+0x20b/0x560 srpt_unregister_mad_agent+0x93/0xd0 [ib_srpt] srpt_remove_one+0x20/0x150 [ib_srpt] remove_client_context+0x88/0xd0 [ib_core] bond0: (slave p2p1): link status definitely up, 100000 Mbps full duplex disable_device+0x8a/0x160 [ib_core] bond0: active interface up! ? kernfs_name_hash+0x12/0x80 (NULL device *): Bonding Info Received: rdev: 000000006c0b8247 __ib_unregister_device+0x42/0xb0 [ib_core] (NULL device *): Master: mode: 4 num_slaves:2 ib_unregister_device+0x22/0x30 [ib_core] (NULL device *): Slave: id: 105069936 name:p2p1 link:0 state:0 bnxt_re_stopqps_and_ib_uninit+0x83/0x90 [bnxt_re] bnxt_re_alloc_lag+0x12e/0x4e0 [bnxt_re]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 30, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
a42d985bd5b234da8b61347a78dc3057bf7bb94d < 8ec6acdb9b6a80eeb13e778dfedb5d72a88f14fe a42d985bd5b234da8b61347a78dc3057bf7bb94d < 00cc21e32ea1b8ebbabf5d645da9378d986bf8ba a42d985bd5b234da8b61347a78dc3057bf7bb94d < 4323aaedeba32076e652aad056afd7885bb96bb7 a42d985bd5b234da8b61347a78dc3057bf7bb94d < 5f6ef2a574b0e0e0ea46ed0022575442df9d0bf9 a42d985bd5b234da8b61347a78dc3057bf7bb94d < b713623bfef8cb1df9c769a3887fa10db63d1c54 a42d985bd5b234da8b61347a78dc3057bf7bb94d < eca5cd9474cd26d62f9756f536e2e656d3f62f3a
Linux / Linux
3.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/8ec6acdb9b6a80eeb13e778dfedb5d72a88f14fe git.kernel.org: https://git.kernel.org/stable/c/00cc21e32ea1b8ebbabf5d645da9378d986bf8ba git.kernel.org: https://git.kernel.org/stable/c/4323aaedeba32076e652aad056afd7885bb96bb7 git.kernel.org: https://git.kernel.org/stable/c/5f6ef2a574b0e0e0ea46ed0022575442df9d0bf9 git.kernel.org: https://git.kernel.org/stable/c/b713623bfef8cb1df9c769a3887fa10db63d1c54 git.kernel.org: https://git.kernel.org/stable/c/eca5cd9474cd26d62f9756f536e2e656d3f62f3a