CVE-2026-23059 — Classic Buffer Overflow in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 4
Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Sanitize payload size to prevent member overflow
In qla27xx_copy_fpin_pkt() and qla27xx_copy_multiple_pkt(), the frame_size
reported by firmware is used to calculate the copy length into
item->iocb. However, the iocb member is defined as a fixed-size 64-byte
array within struct purex_item.
If the reported frame_size exceeds 64 bytes, subsequent memcpy calls will
overflow the iocb member boundary. While extra me…
Affected Packages4 packages
▶CVEListV5linux/linux875386b98857822b77ac7f95bdf367b70af5b78c — 408bfa8d70f79ac696cec1bdbdfb3bf43a02e6d0+4
🔴Vulnerability Details
3OSV▶
CVE-2026-23059: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Sanitize payload size to prevent member overflow In qla27xx_copy_fp↗2026-02-04
GHSA▶
GHSA-6mm8-fcwp-3g49: In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Sanitize payload size to prevent member overflow
In qla27xx_copy_↗2026-02-04