CVE-2023-54179
Array Index Out-of-Bounds in Linux Kernel qla2xxx Driver
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's scsi qla2xxx driver involves an array index going out of bounds. Specifically, the array 'vha->host_str' of size 16 may be accessed with index values from 16 to 19, which exceeds its allocated size. The issue arises from using sprintf() instead of the safer snprintf(), which can lead to buffer overflows or memory corruption.
How can this vulnerability impact me? :
The out-of-bounds array access can cause memory corruption, potentially leading to system instability, crashes, or security issues such as privilege escalation or denial of service if exploited.