CVE-2023-53676
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
07/10/2025
Last modified:
03/02/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()<br />
<br />
The function lio_target_nacl_info_show() uses sprintf() in a loop to print<br />
details for every iSCSI connection in a session without checking for the<br />
buffer length. With enough iSCSI connections it&#39;s possible to overflow the<br />
buffer provided by configfs and corrupt the memory.<br />
<br />
This patch replaces sprintf() with sysfs_emit_at() that checks for buffer<br />
boundries.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.1 (including) | 4.14.326 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.295 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.257 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.197 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.133 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.55 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.5.5 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0cac6cbb9908309352a5d30c1876882771d3da50
- https://git.kernel.org/stable/c/114b44dddea1f8f99576de3c0e6e9059012002fc
- https://git.kernel.org/stable/c/2cbe6a88fbdd6e8aeab358eef61472e2de43d6f6
- https://git.kernel.org/stable/c/4738bf8b2d3635c2944b81b2a84d97b8c8b0978d
- https://git.kernel.org/stable/c/5353df78c22623b42a71d51226d228a8413097e2
- https://git.kernel.org/stable/c/801f287c93ff95582b0a2d2163f12870a2f076d4
- https://git.kernel.org/stable/c/bbe3ff47bf09db8956bc2eeb49d2d514d256ad2a
- https://git.kernel.org/stable/c/df349e84c2cb0dd05d98c8e1189c26ab4b116083



