CVE-2023-53110 Affecting kernel-doc package, versions <0:4.18.0-513.5.1.el8_9


Severity

Recommended
high

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.03% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-KERNELDOC-10035754
  • published5 May 2025
  • disclosed2 May 2025

Introduced: 2 May 2025

CVE-2023-53110  (opens in a new tab)

How to fix?

Upgrade RHEL:8 kernel-doc to version 0:4.18.0-513.5.1.el8_9 or higher.
This issue was patched in RHSA-2023:7077.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-doc package and not the kernel-doc package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix NULL sndbuf_desc in smc_cdc_tx_handler()

When performing a stress test on SMC-R by rmmod mlx5_ib driver during the wrk/nginx test, we found that there is a probability of triggering a panic while terminating all link groups.

This issue dues to the race between smc_smcr_terminate_all() and smc_buf_create().

        smc_smcr_terminate_all

smc_buf_create /* init */ conn->sndbuf_desc = NULL; ...

        __smc_lgr_terminate
            smc_conn_kill
                smc_close_abort
                    smc_cdc_get_slot_and_msg_send

    __softirqentry_text_start
        smc_wr_tx_process_cqe
            smc_cdc_tx_handler
                READ(conn-&amp;gt;sndbuf_desc-&amp;gt;len);
                /* panic dues to NULL sndbuf_desc */

conn->sndbuf_desc = xxx;

This patch tries to fix the issue by always to check the sndbuf_desc before send any cdc msg, to make sure that no null pointer is seen during cqe processing.

CVSS Base Scores

version 3.1