CVE-2023-53576NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: null_blk: Always check queue mode setting from configfs Make sure to check device queue mode in the null_validate_conf() and return error for NULL_Q_RQ as we don't allow legacy I/O path, without this patch we get OOPs when queue mode is set to 1 from configfs, following are repro steps :- modprobe null_blk nr_devices=0 mkdir config/nullb/nullb0 echo 1 > config/nullb/nullb0/memory_backed echo 4096 > config/nullb/nullb0/blocksi

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel4.205.10.181+3
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linuxe50b1e327aeb4b224364aa6f85c1713ff8b3654be732a266b973cd4e115e2cc2ea5007119e8a7fbc+5
debiandebian/linux< linux 6.1.37-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53576: In the Linux kernel, the following vulnerability has been resolved: null_blk: Always check queue mode setting from configfs Make sure to check device2025-10-04
GHSA
GHSA-5h6w-mmcg-hf8j: In the Linux kernel, the following vulnerability has been resolved: null_blk: Always check queue mode setting from configfs Make sure to check devic2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: null_blk: Always check queue mode setting from configfs2025-10-04
Debian
CVE-2023-53576: linux - In the Linux kernel, the following vulnerability has been resolved: null_blk: A...2023