-

CVE-2023-53543

In the Linux kernel, the following vulnerability has been resolved:

vdpa: Add max vqp attr to vdpa_nl_policy for nlattr length check

The vdpa_nl_policy structure is used to validate the nlattr when parsing
the incoming nlmsg. It will ensure the attribute being described produces
a valid nlattr pointer in info->attrs before entering into each handler
in vdpa_nl_ops.

That is to say, the missing part in vdpa_nl_policy may lead to illegal
nlattr after parsing, which could lead to OOB read just like CVE-2023-3773.

This patch adds the missing nla_policy for vdpa max vqp attr to avoid
such bugs.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < ff71709445ac033e6e250d971683110e4781c068
Version ad69dd0bf26b88ec6ab26f8bbe5cd74fbed7672a
Status affected
Version < ea65e8b5e6b1a34deda7564f09c90e9e80db436a
Version ad69dd0bf26b88ec6ab26f8bbe5cd74fbed7672a
Status affected
Version < 5d6ba607d6cb5c58a4ddf33381e18c83dbb4098f
Version ad69dd0bf26b88ec6ab26f8bbe5cd74fbed7672a
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.16
Status affected
Version < 5.16
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.47
Status unaffected
Version <= 6.4.*
Version 6.4.12
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.036
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string