In the Linux kernel, the following vulnerability has been resolved:
nvme-tcp: don't access released socket during error recovery
While the error recovery work is temporarily failing reconnect attempts,
running the 'nvme list' command causes a kernel NULL pointer dereference
by calling getsockname() with a released socket.
During error recovery work, the nvme tcp socket is released and a new one
created, so it is not safe to access the socket without proper check.
References
Configurations
Configuration 1 (hide)
|
History
03 Feb 2026, 22:29
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux linux Kernel
Linux |
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/76d54bf20cdcc1ed7569a89885e09636e9a8d71d - Patch | |
| References | () https://git.kernel.org/stable/c/d82f762db4776fa11de88018f0f5de2d5db72a72 - Patch | |
| References | () https://git.kernel.org/stable/c/fe2d9e54165dadaa0d0cc3355c0be9c3e129fa0d - Patch | |
| CWE | CWE-476 |
Information
Published : 2025-10-07 16:15
Updated : 2026-02-03 22:29
NVD link : CVE-2023-53643
Mitre link : CVE-2023-53643
CVE.ORG link : CVE-2023-53643
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
