CVE-2023-53296NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 16

Description

In the Linux kernel, the following vulnerability has been resolved: sctp: check send stream number after wait_for_sndbuf This patch fixes a corner case where the asoc out stream count may change after wait_for_sndbuf. When the main thread in the client starts a connection, if its out stream count is set to N while the in stream count in the server is set to N - 2, another thread in the client keeps sending the msgs with stream number N - 1, and waits for sndbuf before processing INIT_ACK. Ho

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel4.154.19.281+6
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux5bbbbe32a43199c2b9ea5ea66fab6241c64beb519346a1a21142357972a6f466ba6275ddc54b04ac+7
debiandebian/linux< linux 6.1.25-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53296: In the Linux kernel, the following vulnerability has been resolved: sctp: check send stream number after wait_for_sndbuf This patch fixes a corner cas2025-09-16
GHSA
GHSA-vwf3-3r65-6v22: In the Linux kernel, the following vulnerability has been resolved: sctp: check send stream number after wait_for_sndbuf This patch fixes a corner c2025-09-16

📋Vendor Advisories

2
Red Hat
kernel: sctp: check send stream number after wait_for_sndbuf2025-09-16
Debian
CVE-2023-53296: linux - In the Linux kernel, the following vulnerability has been resolved: sctp: check...2023
CVE-2023-53296 — NULL Pointer Dereference in Linux | cvebase