-
CVE-2023-53543
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:16:52
- Zuletzt bearbeitet 06.10.2025 14:56:21
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: vdpa: Add max vqp attr to vdpa_nl_policy for nlattr length check The vdpa_nl_policy structure is used to validate the nlattr when parsing the incoming nlmsg. It will ensure the attribute being described produces a valid nlattr pointer in info->attrs before entering into each handler in vdpa_nl_ops. That is to say, the missing part in vdpa_nl_policy may lead to illegal nlattr after parsing, which could lead to OOB read just like CVE-2023-3773. This patch adds the missing nla_policy for vdpa max vqp attr to avoid such bugs.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
ff71709445ac033e6e250d971683110e4781c068
Version
ad69dd0bf26b88ec6ab26f8bbe5cd74fbed7672a
Status
affected
Version <
ea65e8b5e6b1a34deda7564f09c90e9e80db436a
Version
ad69dd0bf26b88ec6ab26f8bbe5cd74fbed7672a
Status
affected
Version <
5d6ba607d6cb5c58a4ddf33381e18c83dbb4098f
Version
ad69dd0bf26b88ec6ab26f8bbe5cd74fbed7672a
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.16
Status
affected
Version <
5.16
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.47
Status
unaffected
Version <=
6.4.*
Version
6.4.12
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.036 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|