CVE-2023-54031Out-of-bounds Read in Kernel

CWE-125Out-of-bounds Read7 documents6 sources
Severity
4.4MEDIUMNVD
No vector
EPSS
0.0%
top 92.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check The vdpa_nl_policy structure is used to validate the nlattr when parsing the incoming nlmsg. It will ensure the attribute being described produces a valid nlattr pointer in info->attrs before entering into each handler in vdpa_nl_ops. That is to say, the missing part in vdpa_nl_policy may lead to illegal nlattr after parsing, which could lead to OOB read jus

Affected Packages3 packages

Linuxlinux/linux_kernel5.19.06.1.47+1
Debianlinux/linux_kernel< 6.1.52-1+2
debiandebian/linux< linux 6.1.52-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-8vph-jw2x-79f2: In the Linux kernel, the following vulnerability has been resolved: vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check The vdpa_nl2025-12-24
OSV
CVE-2023-54031: In the Linux kernel, the following vulnerability has been resolved: vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check The vdpa_nl_p2025-12-24
OSV
vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check2025-12-24
Debian
CVE-2023-54031: linux - In the Linux kernel, the following vulnerability has been resolved: vdpa: Add q...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54031 Impact, Exploitability, and Mitigation Steps | Wiz