In the Linux kernel, the following vulnerability has been resolved:
vdpa: Add features attr to vdpa_nl_policy for nlattr length check
The vdpa_nl_policy structure is used to validate the nlattr when parsing
the incoming nlmsg. It will ensure the attribute being described produces
a valid nlattr pointer in info->attrs before entering into each handler
in vdpa_nl_ops.
That is to say, the missing part in vdpa_nl_policy may lead to illegal
nlattr after parsing, which could lead to OOB read just like CVE-2023-3773.
This patch adds the missing nla_policy for vdpa features attr to avoid
such bugs.
References
Configurations
Configuration 1 (hide)
|
History
03 Feb 2026, 22:24
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux linux Kernel
Linux |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-787 | |
| References | () https://git.kernel.org/stable/c/44b508cc96889e61799cc0fc6c00766a54f3ab5a - Patch | |
| References | () https://git.kernel.org/stable/c/645d17e06c502e71b880b2b854930e5a64014640 - Patch | |
| References | () https://git.kernel.org/stable/c/79c8651587504ba263d2fd67fd4406240fb21f69 - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.5:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:* |
Information
Published : 2025-10-07 16:15
Updated : 2026-02-03 22:24
NVD link : CVE-2023-53652
Mitre link : CVE-2023-53652
CVE.ORG link : CVE-2023-53652
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write
