CVE-2023-54195
Null Pointer Dereference in Linux rxrpc Call Timeout Handling
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.3.0-rc7 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's rxrpc subsystem involves a timing issue where a call's timeout timer starts before a communication channel is assigned. Specifically, the call timer may expire before a connection is established, leading to a kernel NULL pointer dereference (a crash). The issue occurs because the timeout is set too early, and the fix delays starting the timer until the first packet is transmitted, preventing the crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a NULL pointer dereference when an rxrpc call times out prematurely. This could lead to system instability or denial of service conditions on affected systems.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch or update to a Linux kernel version that includes the fix for this vulnerability, which ensures the call timer starts only when the first packet is transmitted, preventing the kernel NULL pointer dereference. Avoid triggering the vulnerable state from userspace as sendmsg() will return EBUSY if the call is waiting for a connection and interrupted by a signal.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the Linux kernel logs for the specific NULL pointer dereference oops related to rxrpc calls. Look for kernel messages containing 'BUG: kernel NULL pointer dereference' and call traces involving rxrpc_alloc_txbuf, rxrpc_send_ACK, and rxrpc_input_call_event. You can use the following command to check the kernel log for such messages: sudo dmesg | grep -i 'rxrpc' | grep -i 'NULL pointer dereference' Additionally, monitoring for kernel crashes or oops messages related to rxrpc in system logs (e.g., /var/log/kern.log or journalctl) can help detect this issue.