CVE-2023-53476

In the Linux kernel, the following vulnerability has been resolved: iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry() This condition needs to match the previous "if (epcp->state == LISTEN) {" exactly to avoid a NULL dereference of either "listen_ep" or "ep". The problem is that "epcp" has been re-assigned so just testing "if (epcp->state == LISTEN) {" a second time is not sufficient.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

20 Jan 2026, 16:41

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/24278dc380aab6a1aef0a75317f57ad4c2453cf6 - () https://git.kernel.org/stable/c/24278dc380aab6a1aef0a75317f57ad4c2453cf6 - Patch
References () https://git.kernel.org/stable/c/4ca446b127c568b59cb8d9748b6f70499624bb18 - () https://git.kernel.org/stable/c/4ca446b127c568b59cb8d9748b6f70499624bb18 - Patch
References () https://git.kernel.org/stable/c/76e0396313c79ecd0df44ee3c18745cfac52b3e6 - () https://git.kernel.org/stable/c/76e0396313c79ecd0df44ee3c18745cfac52b3e6 - Patch
References () https://git.kernel.org/stable/c/dd55240e4364d64befcc575b0d33091881524f42 - () https://git.kernel.org/stable/c/dd55240e4364d64befcc575b0d33091881524f42 - Patch

01 Oct 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-01 12:15

Updated : 2026-01-20 16:41


NVD link : CVE-2023-53476

Mitre link : CVE-2023-53476

CVE.ORG link : CVE-2023-53476


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference