CVE-2023-53493
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/10/2025
Last modified:
16/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
accel/qaic: tighten bounds checking in decode_message()<br />
<br />
Copy the bounds checking from encode_message() to decode_message().<br />
<br />
This patch addresses the following concerns. Ensure that there is<br />
enough space for at least one header so that we don&#39;t have a negative<br />
size later.<br />
<br />
if (msg_hdr_len data.<br />
<br />
if (msg_len > msg_hdr_len - sizeof(*trans_hdr))<br />
return -EINVAL;<br />
<br />
Check that the trans_hdr->len is not below the minimum size:<br />
<br />
if (hdr_len data, in_trans->data, len - sizeof(in_trans->hdr));<br />
<br />
And finally, use size_add() to prevent an integer overflow:<br />
<br />
if (size_add(msg_len, hdr_len) > msg_hdr_len)
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.4 (including) | 6.4.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



