Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: don't access released socket during error recovery While the error recovery work is temporarily failing reconnect attempts, running the 'nvme list' command causes a kernel NULL pointer dereference by calling getsockname() with a released socket. During error recovery work, the nvme tcp socket is released and a new one created, so it is not safe to access the socket without proper check.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.1, < 6.1.18 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/76d54bf20cdcc1ed7569a89885e09636e9a8d71dPatch
- https://git.kernel.org/stable/c/d82f762db4776fa11de88018f0f5de2d5db72a72Patch
- https://git.kernel.org/stable/c/fe2d9e54165dadaa0d0cc3355c0be9c3e129fa0dPatch
FAQ
What is CVE-2023-53643?
CVE-2023-53643 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: don't access released socket during error recovery While the error recovery work is temporarily failing reconnect attemp...
How severe is CVE-2023-53643?
CVE-2023-53643 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-53643?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.