DEBIAN-CVE-2023-53493

Source
https://security-tracker.debian.org/tracker/CVE-2023-53493
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-53493.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-53493
Upstream
Published
2025-10-01T12:15:52Z
Modified
2025-10-02T09:01:20Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: accel/qaic: tighten bounds checking in decodemessage() Copy the bounds checking from encodemessage() to decodemessage(). This patch addresses the following concerns. Ensure that there is enough space for at least one header so that we don't have a negative size later. if (msghdrlen < sizeof(*transhdr)) Ensure that we have enough space to read the next header from the msg->data. if (msglen > msghdrlen - sizeof(*transhdr)) return -EINVAL; Check that the transhdr->len is not below the minimum size: if (hdrlen < sizeof(*transhdr)) This minimum check ensures that we don't corrupt memory in decodepassthrough() when we do. memcpy(outtrans->data, intrans->data, len - sizeof(intrans->hdr)); And finally, use sizeadd() to prevent an integer overflow: if (sizeadd(msglen, hdrlen) > msghdr_len)

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.4.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.4.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}