CVE-2023-53676

In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() The function lio_target_nacl_info_show() uses sprintf() in a loop to print details for every iSCSI connection in a session without checking for the buffer length. With enough iSCSI connections it's possible to overflow the buffer provided by configfs and corrupt the memory. This patch replaces sprintf() with sysfs_emit_at() that checks for buffer boundries.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

03 Feb 2026, 18:53

Type Values Removed Values Added
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0cac6cbb9908309352a5d30c1876882771d3da50 - () https://git.kernel.org/stable/c/0cac6cbb9908309352a5d30c1876882771d3da50 - Patch
References () https://git.kernel.org/stable/c/114b44dddea1f8f99576de3c0e6e9059012002fc - () https://git.kernel.org/stable/c/114b44dddea1f8f99576de3c0e6e9059012002fc - Patch
References () https://git.kernel.org/stable/c/2cbe6a88fbdd6e8aeab358eef61472e2de43d6f6 - () https://git.kernel.org/stable/c/2cbe6a88fbdd6e8aeab358eef61472e2de43d6f6 - Patch
References () https://git.kernel.org/stable/c/4738bf8b2d3635c2944b81b2a84d97b8c8b0978d - () https://git.kernel.org/stable/c/4738bf8b2d3635c2944b81b2a84d97b8c8b0978d - Patch
References () https://git.kernel.org/stable/c/5353df78c22623b42a71d51226d228a8413097e2 - () https://git.kernel.org/stable/c/5353df78c22623b42a71d51226d228a8413097e2 - Patch
References () https://git.kernel.org/stable/c/801f287c93ff95582b0a2d2163f12870a2f076d4 - () https://git.kernel.org/stable/c/801f287c93ff95582b0a2d2163f12870a2f076d4 - Patch
References () https://git.kernel.org/stable/c/bbe3ff47bf09db8956bc2eeb49d2d514d256ad2a - () https://git.kernel.org/stable/c/bbe3ff47bf09db8956bc2eeb49d2d514d256ad2a - Patch
References () https://git.kernel.org/stable/c/df349e84c2cb0dd05d98c8e1189c26ab4b116083 - () https://git.kernel.org/stable/c/df349e84c2cb0dd05d98c8e1189c26ab4b116083 - Patch

Information

Published : 2025-10-07 16:15

Updated : 2026-02-03 18:53


NVD link : CVE-2023-53676

Mitre link : CVE-2023-53676

CVE.ORG link : CVE-2023-53676


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write