CVE-2023-53686NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7

Description

In the Linux kernel, the following vulnerability has been resolved: net/handshake: fix null-ptr-deref in handshake_nl_done_doit() We should not call trace_handshake_cmd_done_err() if socket lookup has failed. Also we should call trace_handshake_cmd_done_err() before releasing the file, otherwise dereferencing sock->sk can return garbage. This also reverts 7afc6d0a107f ("net/handshake: Fix uninitialized local variable") Unable to handle kernel paging request at virtual address dfff8000000000

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.46.5.4
Debianlinux/linux_kernel< 6.5.6-1+1
CVEListV5linux/linux3b3009ea8abb713b022d94fba95ec270cf6e7eae93d69f18edcca282351394c5870bec24cc99d745+2
debiandebian/linux< linux 6.5.6-1 (forky)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-8c2j-63gq-x4jc: In the Linux kernel, the following vulnerability has been resolved: net/handshake: fix null-ptr-deref in handshake_nl_done_doit() We should not call2025-10-07
OSV
CVE-2023-53686: In the Linux kernel, the following vulnerability has been resolved: net/handshake: fix null-ptr-deref in handshake_nl_done_doit() We should not call t2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: net/handshake: fix null-ptr-deref in handshake_nl_done_doit()2025-10-07
Debian
CVE-2023-53686: linux - In the Linux kernel, the following vulnerability has been resolved: net/handsha...2023