CVE-2023-53676

Source
https://cve.org/CVERecord?id=CVE-2023-53676
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53676.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53676
Downstream
Related
Published
2025-10-07T15:21:31.757Z
Modified
2026-03-20T12:33:17.708643Z
Summary
scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: target: iscsi: Fix buffer overflow in liotargetnaclinfoshow()

The function liotargetnaclinfoshow() uses sprintf() in a loop to print details for every iSCSI connection in a session without checking for the buffer length. With enough iSCSI connections it's possible to overflow the buffer provided by configfs and corrupt the memory.

This patch replaces sprintf() with sysfsemitat() that checks for buffer boundries.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53676.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e48354ce078c079996f89d715dfa44814b4eba01
Fixed
df349e84c2cb0dd05d98c8e1189c26ab4b116083
Fixed
114b44dddea1f8f99576de3c0e6e9059012002fc
Fixed
2cbe6a88fbdd6e8aeab358eef61472e2de43d6f6
Fixed
bbe3ff47bf09db8956bc2eeb49d2d514d256ad2a
Fixed
5353df78c22623b42a71d51226d228a8413097e2
Fixed
4738bf8b2d3635c2944b81b2a84d97b8c8b0978d
Fixed
0cac6cbb9908309352a5d30c1876882771d3da50
Fixed
801f287c93ff95582b0a2d2163f12870a2f076d4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53676.json"