In the Linux kernel, the following vulnerability has been resolved:
scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()
The function lio_target_nacl_info_show() uses sprintf() in a loop to print
details for every iSCSI connection in a session without checking for the
buffer length. With enough iSCSI connections it's possible to overflow the
buffer provided by configfs and corrupt the memory.
This patch replaces sprintf() with sysfs_emit_at() that checks for buffer
boundries.
References
Configurations
Configuration 1 (hide)
|
History
03 Feb 2026, 18:53
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-787 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| First Time |
Linux linux Kernel
Linux |
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/0cac6cbb9908309352a5d30c1876882771d3da50 - Patch | |
| References | () https://git.kernel.org/stable/c/114b44dddea1f8f99576de3c0e6e9059012002fc - Patch | |
| References | () https://git.kernel.org/stable/c/2cbe6a88fbdd6e8aeab358eef61472e2de43d6f6 - Patch | |
| References | () https://git.kernel.org/stable/c/4738bf8b2d3635c2944b81b2a84d97b8c8b0978d - Patch | |
| References | () https://git.kernel.org/stable/c/5353df78c22623b42a71d51226d228a8413097e2 - Patch | |
| References | () https://git.kernel.org/stable/c/801f287c93ff95582b0a2d2163f12870a2f076d4 - Patch | |
| References | () https://git.kernel.org/stable/c/bbe3ff47bf09db8956bc2eeb49d2d514d256ad2a - Patch | |
| References | () https://git.kernel.org/stable/c/df349e84c2cb0dd05d98c8e1189c26ab4b116083 - Patch |
Information
Published : 2025-10-07 16:15
Updated : 2026-02-03 18:53
NVD link : CVE-2023-53676
Mitre link : CVE-2023-53676
CVE.ORG link : CVE-2023-53676
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write
