CVE-2023-53493
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
01/10/2025
Última modificación:
02/10/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
accel/qaic: tighten bounds checking in decode_message()<br />
<br />
Copy the bounds checking from encode_message() to decode_message().<br />
<br />
This patch addresses the following concerns. Ensure that there is<br />
enough space for at least one header so that we don&#39;t have a negative<br />
size later.<br />
<br />
if (msg_hdr_len data.<br />
<br />
if (msg_len > msg_hdr_len - sizeof(*trans_hdr))<br />
return -EINVAL;<br />
<br />
Check that the trans_hdr->len is not below the minimum size:<br />
<br />
if (hdr_len data, in_trans->data, len - sizeof(in_trans->hdr));<br />
<br />
And finally, use size_add() to prevent an integer overflow:<br />
<br />
if (size_add(msg_len, hdr_len) > msg_hdr_len)



