CVE-2023-53643NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 98.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7

Description

In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: don't access released socket during error recovery While the error recovery work is temporarily failing reconnect attempts, running the 'nvme list' command causes a kernel NULL pointer dereference by calling getsockname() with a released socket. During error recovery work, the nvme tcp socket is released and a new one created, so it is not safe to access the socket without proper check.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.16.1.18+1
Debianlinux/linux_kernel< 6.1.20-1+2
CVEListV5linux/linux02c57a82c0081141abc19150beab48ef47f97f18fe2d9e54165dadaa0d0cc3355c0be9c3e129fa0d+3
debiandebian/linux< linux 6.1.20-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-wvjj-gc57-3w9j: In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: don't access released socket during error recovery While the error rec2025-10-07
OSV
CVE-2023-53643: In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: don't access released socket during error recovery While the error recov2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: nvme-tcp: don't access released socket during error recovery2025-10-07
Debian
CVE-2023-53643: linux - In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: d...2023