{"id":"CVE-2023-53464","summary":"scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: iscsi_tcp: Check that sock is valid before iscsi_set_param()\n\nThe validity of sock should be checked before assignment to avoid incorrect\nvalues. Commit 57569c37f0ad (\"scsi: iscsi: iscsi_tcp: Fix null-ptr-deref\nwhile calling getpeername()\") introduced this change which may lead to\ninconsistent values of tcp_sw_conn-\u003esendpage and conn-\u003edatadgst_en.\n\nFix the issue by moving the position of the assignment.","modified":"2026-04-11T12:46:47.480051Z","published":"2025-10-01T11:42:35.186Z","related":["SUSE-SU-2025:03613-1","SUSE-SU-2025:03615-1","SUSE-SU-2025:03626-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3761-1","SUSE-SU-2026:0473-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53464.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/48b19b79cfa37b1e50da3b5a8af529f994c08901"},{"type":"WEB","url":"https://git.kernel.org/stable/c/499757ad3332e2527254f9ab68dec1da087b1d96"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5e5c5f472972c4bc9430adc08b36763a0fa5b9f7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6e06a68fbbfcd8576eee8f7139fa2b13c9b72e91"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b287e21e73ec23f3788fbe40037c42dbe6e9a9a9"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53464.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53464"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"884a788f065578bb640382279a83d1df433b13e6"},{"fixed":"499757ad3332e2527254f9ab68dec1da087b1d96"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"a26b0658751bb0a3b28386fca715333b104d32a2"},{"fixed":"5e5c5f472972c4bc9430adc08b36763a0fa5b9f7"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"57569c37f0add1b6489e1a1563c71519daf732cf"},{"fixed":"6e06a68fbbfcd8576eee8f7139fa2b13c9b72e91"},{"fixed":"b287e21e73ec23f3788fbe40037c42dbe6e9a9a9"},{"fixed":"48b19b79cfa37b1e50da3b5a8af529f994c08901"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"897dbbc57d71e8a34ec1af8e573a142de457da38"},{"last_affected":"0a0b861fce2657ba08ec356a74346b37ca4b2008"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53464.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.10.178"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.107"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.24"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.1.0"},{"fixed":"6.2.11"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53464.json"}}],"schema_version":"1.7.5"}