CVE-2023-53366NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 17

Description

In the Linux kernel, the following vulnerability has been resolved: block: be a bit more careful in checking for NULL bdev while polling Wei reports a crash with an application using polled IO: PGD 14265e067 P4D 14265e067 PUD 47ec50067 PMD 0 Oops: 0000 [#1] SMP CPU: 0 PID: 21915 Comm: iocore_0 Kdump: loaded Tainted: G S 5.12.0-0_fbk12_clang_7346_g1bb6f2e7058f #1 Hardware name: Wiwynn Delta Lake MP T8/Delta Lake-Class2, BIOS Y3DLM08 04/10/2022 RIP: 0010:bio_poll+0x25/0x200 Code: 0f 1f 44 00 00

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages7 packages

NVDlinux/linux_kernel5.156.1.16+1
Debianlinux/linux_kernel< 6.1.20-1+2
CVEListV5linux/linuxbe4d234d7aebbfe0c233bc20b9cdef7ab3408ff41af0bdca03f367874da45d6cbe05fa05b90b1439+3
debiandebian/linux< linux 6.1.20-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53366: In the Linux kernel, the following vulnerability has been resolved: block: be a bit more careful in checking for NULL bdev while polling Wei reports a2025-09-17
GHSA
GHSA-rggc-f5vc-pggf: In the Linux kernel, the following vulnerability has been resolved: block: be a bit more careful in checking for NULL bdev while polling Wei reports2025-09-17

📋Vendor Advisories

3
Red Hat
kernel: block: be a bit more careful in checking for NULL bdev while polling2025-09-17
Microsoft
block: be a bit more careful in checking for NULL bdev while polling2025-09-09
Debian
CVE-2023-53366: linux - In the Linux kernel, the following vulnerability has been resolved: block: be a...2023
CVE-2023-53366 — NULL Pointer Dereference in Linux | cvebase