Project Subscriptions
| Vendors | Products |
|---|---|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Linux
Subscribe
|
Linux Kernel
Subscribe
|
|
Redhat
Subscribe
|
Codeready Linux Builder Eus
Subscribe
Codeready Linux Builder Eus For Power Little Endian Eus
Subscribe
Codeready Linux Builder For Arm64 Eus
Subscribe
Codeready Linux Builder For Ibm Z Systems Eus
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux For Arm 64 Eus
Subscribe
Enterprise Linux For Ibm Z Systems Eus
Subscribe
Enterprise Linux For Power Little Endian Eus
Subscribe
Enterprise Linux For Real Time
Subscribe
Enterprise Linux For Real Time For Nfv
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions
Subscribe
Enterprise Linux Server Tus
Subscribe
Logging
Subscribe
Rhel Eus
Subscribe
Rhev Hypervisor
Subscribe
Virtualization Host
Subscribe
|
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3841-1 | linux-5.10 security update |
EUVD |
EUVD-2023-58597 | A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service. |
Ubuntu USN |
USN-6818-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6818-2 | Linux kernel (ARM laptop) vulnerabilities |
Ubuntu USN |
USN-6818-3 | Linux kernel (NVIDIA) vulnerabilities |
Ubuntu USN |
USN-6818-4 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-6819-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6819-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6819-3 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6819-4 | Linux kernel (Oracle) vulnerabilities |
Solution
No solution given by the vendor.
Workaround
To mitigate this issue, prevent module nvmet-tcp from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.
Tue, 04 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 15 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Metrics |
ssvc
|
Tue, 27 Aug 2024 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Debian
Debian debian Linux |
|
| CPEs | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Debian
Debian debian Linux |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-06T21:45:11.718Z
Reserved: 2023-11-28T05:16:10.932Z
Link: CVE-2023-6356
Updated: 2025-11-04T18:21:56.394Z
Status : Modified
Published: 2024-02-07T21:15:08.317
Modified: 2025-11-04T19:16:24.080
Link: CVE-2023-6356
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN