Input validation error in Linux kernel - CVE-2023-53464
Published: October 1, 2025 / Updated: October 27, 2025
Vulnerability identifier: #VU116380
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2023-53464
CWE-ID: CWE-20
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the iscsi_sw_tcp_conn_set_param() function in drivers/scsi/iscsi_tcp.c. A local user can perform a denial of service (DoS) attack.
How to mitigate CVE-2023-53464
Install update from vendor's repository.
Sources
- https://git.kernel.org/stable/c/48b19b79cfa37b1e50da3b5a8af529f994c08901
- https://git.kernel.org/stable/c/499757ad3332e2527254f9ab68dec1da087b1d96
- https://git.kernel.org/stable/c/5e5c5f472972c4bc9430adc08b36763a0fa5b9f7
- https://git.kernel.org/stable/c/6e06a68fbbfcd8576eee8f7139fa2b13c9b72e91
- https://git.kernel.org/stable/c/b287e21e73ec23f3788fbe40037c42dbe6e9a9a9
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.11