CVE-2023-54054
Unknown Unknown - Not Provided
Buffer Overflow in Linux qla2xxx Driver Fixed

Publication date: 2025-12-24

Last updated on: 2025-12-24

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix buffer overrun Klocwork warning: Buffer Overflow - Array Index Out of Bounds Driver uses fc_els_flogi to calculate size of buffer. The actual buffer is nested inside of fc_els_flogi which is smaller. Replace structure name to allow proper size calculation.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-24
Last Modified
2025-12-24
Generated
2026-05-07
AI Q&A
2025-12-24
EPSS Evaluated
2025-12-30
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a buffer overrun (buffer overflow) in the Linux kernel's qla2xxx SCSI driver. The driver uses the fc_els_flogi structure to calculate the size of a buffer, but the actual buffer nested inside fc_els_flogi is smaller than expected. This mismatch can lead to an array index out of bounds, causing a buffer overflow. The fix involved replacing the structure name to ensure the proper size calculation of the buffer.


How can this vulnerability impact me? :

A buffer overflow vulnerability can potentially allow an attacker to overwrite memory, which may lead to system crashes, data corruption, or execution of arbitrary code with kernel privileges. This can compromise system stability and security.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart