In the Linux kernel, the following vulnerability has been resolved:
scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param()
The validity of sock should be checked before assignment to avoid incorrect
values. Commit 57569c37f0ad ("scsi: iscsi: iscsi_tcp: Fix null-ptr-deref
while calling getpeername()") introduced this change which may lead to
inconsistent values of tcp_sw_conn->sendpage and conn->datadgst_en.
Fix the issue by moving the position of the assignment.
References
Configurations
Configuration 1 (hide)
|
History
20 Jan 2026, 15:56
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:* |
|
| CWE | CWE-476 | |
| References | () https://git.kernel.org/stable/c/48b19b79cfa37b1e50da3b5a8af529f994c08901 - Patch | |
| References | () https://git.kernel.org/stable/c/499757ad3332e2527254f9ab68dec1da087b1d96 - Patch | |
| References | () https://git.kernel.org/stable/c/5e5c5f472972c4bc9430adc08b36763a0fa5b9f7 - Patch | |
| References | () https://git.kernel.org/stable/c/6e06a68fbbfcd8576eee8f7139fa2b13c9b72e91 - Patch | |
| References | () https://git.kernel.org/stable/c/b287e21e73ec23f3788fbe40037c42dbe6e9a9a9 - Patch |
01 Oct 2025, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-01 12:15
Updated : 2026-01-20 15:56
NVD link : CVE-2023-53464
Mitre link : CVE-2023-53464
CVE.ORG link : CVE-2023-53464
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
