-
CVE-2023-53464
- EPSS 0.02%
- Veröffentlicht 01.10.2025 12:15:48
- Zuletzt bearbeitet 02.10.2025 19:12:17
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param() The validity of sock should be checked before assignment to avoid incorrect values. Commit 57569c37f0ad ("scsi: iscsi: iscsi_tcp: Fix null-ptr-deref while calling getpeername()") introduced this change which may lead to inconsistent values of tcp_sw_conn->sendpage and conn->datadgst_en. Fix the issue by moving the position of the assignment.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
499757ad3332e2527254f9ab68dec1da087b1d96
Version
884a788f065578bb640382279a83d1df433b13e6
Status
affected
Version <
5e5c5f472972c4bc9430adc08b36763a0fa5b9f7
Version
a26b0658751bb0a3b28386fca715333b104d32a2
Status
affected
Version <
6e06a68fbbfcd8576eee8f7139fa2b13c9b72e91
Version
57569c37f0add1b6489e1a1563c71519daf732cf
Status
affected
Version <
b287e21e73ec23f3788fbe40037c42dbe6e9a9a9
Version
57569c37f0add1b6489e1a1563c71519daf732cf
Status
affected
Version <
48b19b79cfa37b1e50da3b5a8af529f994c08901
Version
57569c37f0add1b6489e1a1563c71519daf732cf
Status
affected
Version
897dbbc57d71e8a34ec1af8e573a142de457da38
Status
affected
Version
0a0b861fce2657ba08ec356a74346b37ca4b2008
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.1
Status
affected
Version <
6.1
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.178
Status
unaffected
Version <=
5.15.*
Version
5.15.107
Status
unaffected
Version <=
6.1.*
Version
6.1.24
Status
unaffected
Version <=
6.2.*
Version
6.2.11
Status
unaffected
Version <=
*
Version
6.3
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.05 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|