CVE-2023-54054
Buffer Overflow in Linux qla2xxx Driver Fixed
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a buffer overrun (buffer overflow) in the Linux kernel's qla2xxx SCSI driver. The driver uses the fc_els_flogi structure to calculate the size of a buffer, but the actual buffer nested inside fc_els_flogi is smaller than expected. This mismatch can lead to an array index out of bounds, causing a buffer overflow. The fix involved replacing the structure name to ensure the proper size calculation of the buffer.
How can this vulnerability impact me? :
A buffer overflow vulnerability can potentially allow an attacker to overwrite memory, which may lead to system crashes, data corruption, or execution of arbitrary code with kernel privileges. This can compromise system stability and security.