Home

Description

In the Linux kernel, the following vulnerability has been resolved: iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry() This condition needs to match the previous "if (epcp->state == LISTEN) {" exactly to avoid a NULL dereference of either "listen_ep" or "ep". The problem is that "epcp" has been re-assigned so just testing "if (epcp->state == LISTEN) {" a second time is not sufficient.

PUBLISHED Reserved 2025-10-01 | Published 2025-10-01 | Updated 2025-10-01 | Assigner Linux

Product status

Default status
unaffected

116aeb8873712ea559d26b0d9d88147af5c88db5 before 76e0396313c79ecd0df44ee3c18745cfac52b3e6
affected

116aeb8873712ea559d26b0d9d88147af5c88db5 before 24278dc380aab6a1aef0a75317f57ad4c2453cf6
affected

116aeb8873712ea559d26b0d9d88147af5c88db5 before dd55240e4364d64befcc575b0d33091881524f42
affected

116aeb8873712ea559d26b0d9d88147af5c88db5 before 4ca446b127c568b59cb8d9748b6f70499624bb18
affected

Default status
affected

4.18
affected

Any version before 4.18
unaffected

5.15.99
unaffected

6.1.16
unaffected

6.2.3
unaffected

6.3
unaffected

References

git.kernel.org/...c/76e0396313c79ecd0df44ee3c18745cfac52b3e6

git.kernel.org/...c/24278dc380aab6a1aef0a75317f57ad4c2453cf6

git.kernel.org/...c/dd55240e4364d64befcc575b0d33091881524f42

git.kernel.org/...c/4ca446b127c568b59cb8d9748b6f70499624bb18

cve.org (CVE-2023-53476)

nvd.nist.gov (CVE-2023-53476)

Download JSON