CVE-2023-53832 Affecting kernel-ipaclones-internal package, versions *


Severity

Recommended
medium

Based on Red Hat Enterprise Linux security rating.

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-KERNELIPACLONESINTERNAL-14333816
  • published10 Dec 2025
  • disclosed9 Dec 2025

Introduced: 9 Dec 2025

NewCVE-2023-53832  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:8 kernel-ipaclones-internal.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-ipaclones-internal package and not the kernel-ipaclones-internal package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix null-ptr-deref in raid10_sync_request

init_resync() inits mempool and sets conf->have_replacemnt at the beginning of sync, close_sync() frees the mempool when sync is completed.

After [1] recovery might be skipped and init_resync() is called but close_sync() is not. null-ptr-deref occurs with r10bio->dev[i].repl_bio.

The following is one way to reproduce the issue.

  1. create a array, wait for resync to complete, mddev->recovery_cp is set to MaxSector.
  2. recovery is woken and it is skipped. conf->have_replacement is set to 0 in init_resync(). close_sync() not called.
  3. some io errors and rdev A is set to WantReplacement.
  4. a new device is added and set to A's replacement.
  5. recovery is woken, A have replacement, but conf->have_replacemnt is
    1. r10bio->dev[i].repl_bio will not be alloced and null-ptr-deref occurs.

Fix it by not calling init_resync() if recovery skipped.

[1] commit 7e83ccbecd60 ("md/raid10: Allow skipping recovery when clean arrays are assembled")

CVSS Base Scores

version 3.1