-

CVE-2023-53803

In the Linux kernel, the following vulnerability has been resolved:

scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process()

A fix for:

BUG: KASAN: slab-out-of-bounds in ses_enclosure_data_process+0x949/0xe30 [ses]
Read of size 1 at addr ffff88a1b043a451 by task systemd-udevd/3271

Checking after (and before in next loop) addl_desc_ptr[1] is sufficient, we
expect the size to be sanitized before first access to addl_desc_ptr[1].
Make sure we don't walk beyond end of page.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < da1a955c48a16e16e925d6544793914e52a6fa51
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 9e5c7d52085b8c84bc82a261580f0eb170039325
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 467afb1dd630d8c6d172bd6cacc125199b5f4f2d
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < e4dd25da784b2e07dbfbf04509afa4c5a1375227
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 2b28a7d261cb309912596d6a2d383ca370483527
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 0dfe68394cbe1d4fe579fb325ecc813c50528c5a
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 799e8dd2022d2e13f0c5c1906b40ceca07a23349
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 9b4f5028e493cb353a5c8f5c45073eeea0303abd
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version <= 4.14.*
Version 4.14.308
Status unaffected
Version <= 4.19.*
Version 4.19.276
Status unaffected
Version <= 5.4.*
Version 5.4.235
Status unaffected
Version <= 5.10.*
Version 5.10.173
Status unaffected
Version <= 5.15.*
Version 5.15.99
Status unaffected
Version <= 6.1.*
Version 6.1.16
Status unaffected
Version <= 6.2.*
Version 6.2.3
Status unaffected
Version <= *
Version 6.3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.058
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String