CVE-2023-53476

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53476
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53476.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53476
Downstream
Related
Published
2025-10-01T11:42:45Z
Modified
2025-10-15T07:21:32.599854Z
Summary
iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry()
Details

In the Linux kernel, the following vulnerability has been resolved:

iwcxgb4: Fix potential NULL dereference in c4iwfillrescmidentry()

This condition needs to match the previous "if (epcp->state == LISTEN) {" exactly to avoid a NULL dereference of either "listen_ep" or "ep". The problem is that "epcp" has been re-assigned so just testing "if (epcp->state == LISTEN) {" a second time is not sufficient.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
116aeb8873712ea559d26b0d9d88147af5c88db5
Fixed
76e0396313c79ecd0df44ee3c18745cfac52b3e6
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
116aeb8873712ea559d26b0d9d88147af5c88db5
Fixed
24278dc380aab6a1aef0a75317f57ad4c2453cf6
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
116aeb8873712ea559d26b0d9d88147af5c88db5
Fixed
dd55240e4364d64befcc575b0d33091881524f42
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
116aeb8873712ea559d26b0d9d88147af5c88db5
Fixed
4ca446b127c568b59cb8d9748b6f70499624bb18

Affected versions

v4.*

v4.17
v4.17-rc2
v4.17-rc3
v4.17-rc4
v4.17-rc5
v4.17-rc6
v4.17-rc7
v4.18
v4.18-rc1
v4.18-rc2
v4.18-rc3
v4.18-rc4
v4.18-rc5
v4.18-rc6
v4.18-rc7
v4.18-rc8
v4.19
v4.19-rc1
v4.19-rc2
v4.19-rc3
v4.19-rc4
v4.19-rc5
v4.19-rc6
v4.19-rc7
v4.19-rc8
v4.20
v4.20-rc1
v4.20-rc2
v4.20-rc3
v4.20-rc4
v4.20-rc5
v4.20-rc6
v4.20-rc7

v5.*

v5.0
v5.0-rc1
v5.0-rc2
v5.0-rc3
v5.0-rc4
v5.0-rc5
v5.0-rc6
v5.0-rc7
v5.0-rc8
v5.1
v5.1-rc1
v5.1-rc2
v5.1-rc3
v5.1-rc4
v5.1-rc5
v5.1-rc6
v5.1-rc7
v5.10
v5.10-rc1
v5.10-rc2
v5.10-rc3
v5.10-rc4
v5.10-rc5
v5.10-rc6
v5.10-rc7
v5.11
v5.11-rc1
v5.11-rc2
v5.11-rc3
v5.11-rc4
v5.11-rc5
v5.11-rc6
v5.11-rc7
v5.12
v5.12-rc1
v5.12-rc1-dontuse
v5.12-rc2
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.24
v5.15.25
v5.15.26
v5.15.27
v5.15.28
v5.15.29
v5.15.3
v5.15.30
v5.15.31
v5.15.32
v5.15.33
v5.15.34
v5.15.35
v5.15.36
v5.15.37
v5.15.38
v5.15.39
v5.15.4
v5.15.40
v5.15.41
v5.15.42
v5.15.43
v5.15.44
v5.15.45
v5.15.46
v5.15.47
v5.15.48
v5.15.49
v5.15.5
v5.15.50
v5.15.51
v5.15.52
v5.15.53
v5.15.54
v5.15.55
v5.15.56
v5.15.57
v5.15.58
v5.15.59
v5.15.6
v5.15.60
v5.15.61
v5.15.62
v5.15.63
v5.15.64
v5.15.65
v5.15.66
v5.15.67
v5.15.68
v5.15.69
v5.15.7
v5.15.70
v5.15.71
v5.15.72
v5.15.73
v5.15.74
v5.15.75
v5.15.76
v5.15.77
v5.15.78
v5.15.79
v5.15.8
v5.15.80
v5.15.81
v5.15.82
v5.15.83
v5.15.84
v5.15.85
v5.15.86
v5.15.87
v5.15.88
v5.15.89
v5.15.9
v5.15.90
v5.15.91
v5.15.92
v5.15.93
v5.15.94
v5.15.95
v5.15.96
v5.15.97
v5.15.98
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v5.2
v5.2-rc1
v5.2-rc2
v5.2-rc3
v5.2-rc4
v5.2-rc5
v5.2-rc6
v5.2-rc7
v5.3
v5.3-rc1
v5.3-rc2
v5.3-rc3
v5.3-rc4
v5.3-rc5
v5.3-rc6
v5.3-rc7
v5.3-rc8
v5.4
v5.4-rc1
v5.4-rc2
v5.4-rc3
v5.4-rc4
v5.4-rc5
v5.4-rc6
v5.4-rc7
v5.4-rc8
v5.5
v5.5-rc1
v5.5-rc2
v5.5-rc3
v5.5-rc4
v5.5-rc5
v5.5-rc6
v5.5-rc7
v5.6
v5.6-rc1
v5.6-rc2
v5.6-rc3
v5.6-rc4
v5.6-rc5
v5.6-rc6
v5.6-rc7
v5.7
v5.7-rc1
v5.7-rc2
v5.7-rc3
v5.7-rc4
v5.7-rc5
v5.7-rc6
v5.7-rc7
v5.8
v5.8-rc1
v5.8-rc2
v5.8-rc3
v5.8-rc4
v5.8-rc5
v5.8-rc6
v5.8-rc7
v5.9
v5.9-rc1
v5.9-rc2
v5.9-rc3
v5.9-rc4
v5.9-rc5
v5.9-rc6
v5.9-rc7
v5.9-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.11
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.2
v6.1.3
v6.1.4
v6.1.5
v6.1.6
v6.1.7
v6.1.8
v6.1.9
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.2.1
v6.2.2

Database specific

{
    "vanir_signatures": [
        {
            "deprecated": false,
            "signature_type": "Line",
            "target": {
                "file": "drivers/infiniband/hw/cxgb4/restrack.c"
            },
            "signature_version": "v1",
            "digest": {
                "line_hashes": [
                    "306916186282857807521041754243975409292",
                    "262336503031058136535878709723387998245",
                    "224064532901553933375323344777354158574",
                    "72578001209695310048374120876413854992"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2023-53476-2a7201bb",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4ca446b127c568b59cb8d9748b6f70499624bb18"
        },
        {
            "deprecated": false,
            "signature_type": "Line",
            "target": {
                "file": "drivers/infiniband/hw/cxgb4/restrack.c"
            },
            "signature_version": "v1",
            "digest": {
                "line_hashes": [
                    "306916186282857807521041754243975409292",
                    "262336503031058136535878709723387998245",
                    "224064532901553933375323344777354158574",
                    "72578001209695310048374120876413854992"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2023-53476-8b2baca5",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dd55240e4364d64befcc575b0d33091881524f42"
        },
        {
            "deprecated": false,
            "signature_type": "Function",
            "target": {
                "file": "drivers/infiniband/hw/cxgb4/restrack.c",
                "function": "c4iw_fill_res_cm_id_entry"
            },
            "signature_version": "v1",
            "digest": {
                "length": 1675.0,
                "function_hash": "76540015817032289103756019958224497507"
            },
            "id": "CVE-2023-53476-937c16df",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dd55240e4364d64befcc575b0d33091881524f42"
        },
        {
            "deprecated": false,
            "signature_type": "Line",
            "target": {
                "file": "drivers/infiniband/hw/cxgb4/restrack.c"
            },
            "signature_version": "v1",
            "digest": {
                "line_hashes": [
                    "306916186282857807521041754243975409292",
                    "262336503031058136535878709723387998245",
                    "224064532901553933375323344777354158574",
                    "72578001209695310048374120876413854992"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2023-53476-99ed5a0e",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@76e0396313c79ecd0df44ee3c18745cfac52b3e6"
        },
        {
            "deprecated": false,
            "signature_type": "Line",
            "target": {
                "file": "drivers/infiniband/hw/cxgb4/restrack.c"
            },
            "signature_version": "v1",
            "digest": {
                "line_hashes": [
                    "306916186282857807521041754243975409292",
                    "262336503031058136535878709723387998245",
                    "224064532901553933375323344777354158574",
                    "72578001209695310048374120876413854992"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2023-53476-a302dab5",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@24278dc380aab6a1aef0a75317f57ad4c2453cf6"
        },
        {
            "deprecated": false,
            "signature_type": "Function",
            "target": {
                "file": "drivers/infiniband/hw/cxgb4/restrack.c",
                "function": "c4iw_fill_res_cm_id_entry"
            },
            "signature_version": "v1",
            "digest": {
                "length": 1675.0,
                "function_hash": "76540015817032289103756019958224497507"
            },
            "id": "CVE-2023-53476-b3592994",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@24278dc380aab6a1aef0a75317f57ad4c2453cf6"
        },
        {
            "deprecated": false,
            "signature_type": "Function",
            "target": {
                "file": "drivers/infiniband/hw/cxgb4/restrack.c",
                "function": "c4iw_fill_res_cm_id_entry"
            },
            "signature_version": "v1",
            "digest": {
                "length": 1675.0,
                "function_hash": "76540015817032289103756019958224497507"
            },
            "id": "CVE-2023-53476-d08e81c2",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@76e0396313c79ecd0df44ee3c18745cfac52b3e6"
        },
        {
            "deprecated": false,
            "signature_type": "Function",
            "target": {
                "file": "drivers/infiniband/hw/cxgb4/restrack.c",
                "function": "c4iw_fill_res_cm_id_entry"
            },
            "signature_version": "v1",
            "digest": {
                "length": 1675.0,
                "function_hash": "76540015817032289103756019958224497507"
            },
            "id": "CVE-2023-53476-dd5628fb",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4ca446b127c568b59cb8d9748b6f70499624bb18"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.18.0
Fixed
5.15.99
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.16
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.3