CVE-2023-53110 Affecting kernel-zfcpdump-devel package, versions *


Severity

Recommended
0.0
medium
0
10

Based on CentOS security rating.

Threat Intelligence

EPSS
0.02% (4th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS8-KERNELZFCPDUMPDEVEL-10035729
  • published5 May 2025
  • disclosed2 May 2025

Introduced: 2 May 2025

NewCVE-2023-53110  (opens in a new tab)

How to fix?

There is no fixed version for Centos:8 kernel-zfcpdump-devel.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-zfcpdump-devel package and not the kernel-zfcpdump-devel package as distributed by Centos. See How to fix? for Centos:8 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix NULL sndbuf_desc in smc_cdc_tx_handler()

When performing a stress test on SMC-R by rmmod mlx5_ib driver during the wrk/nginx test, we found that there is a probability of triggering a panic while terminating all link groups.

This issue dues to the race between smc_smcr_terminate_all() and smc_buf_create().

        smc_smcr_terminate_all

smc_buf_create /* init */ conn->sndbuf_desc = NULL; ...

        __smc_lgr_terminate
            smc_conn_kill
                smc_close_abort
                    smc_cdc_get_slot_and_msg_send

    __softirqentry_text_start
        smc_wr_tx_process_cqe
            smc_cdc_tx_handler
                READ(conn->sndbuf_desc->len);
                /* panic dues to NULL sndbuf_desc */

conn->sndbuf_desc = xxx;

This patch tries to fix the issue by always to check the sndbuf_desc before send any cdc msg, to make sure that no null pointer is seen during cqe processing.

CVSS Base Scores

version 3.1