CVE-2023-54179
Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Array index may go out of bound
Klocwork reports array 'vha->host_str' of size 16 may use index value(s) 16..19. Use snprintf() instead of sprintf().
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's qla2xxx SCSI driver, an out-of-bounds array access in vha->host_str was fixed by replacing sprintf() with snprintf().
Vulnerability
CVE-2023-54179 is an out-of-bounds array index vulnerability in the Linux kernel's qla2xxx SCSI driver. The issue was reported by Klocwork static analysis, which identified that the array vha->host_str, defined with a size of 16, could be accessed using index values 16 through 19. This occurs because the code used sprintf() without length checking, allowing writes beyond the allocated buffer.
Exploitation
Exploitation requires no special privileges beyond the ability to trigger the vulnerable code path in the qla2xxx driver. The attack surface is local, as the driver is part of the kernel and accessible to users with sufficient permissions to interact with SCSI devices. The vulnerability is a classic buffer overflow caused by unbounded string formatting.
Impact
An attacker who successfully triggers the out-of-bounds write could corrupt adjacent kernel memory, potentially leading to system instability, denial of service, or privilege escalation. The exact impact depends on the memory layout and what data is overwritten.
Mitigation
The fix replaces sprintf() with snprintf(), which limits the number of bytes written to the array, preventing the out-of-bounds access. The patch has been applied to the stable kernel branches as referenced in the commit logs [1][2][3]. Users should update their kernels to include this fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
7e697f466bf61ea64c727f201bcd773969a87748d8f8698a22b3bdef089b9e934737e18ffd721b591b95cVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- git.kernel.org/stable/c/2b3bdef089b920b4a19fefb4f4e6dda56a4bb583nvd
- git.kernel.org/stable/c/748d8f8698a2f48ffe32dd7b35dbab1810ed1f82nvd
- git.kernel.org/stable/c/bcd773969a87d9802053c0db5be84abd6594a024nvd
- git.kernel.org/stable/c/d721b591b95cf3f290f8a7cbe90aa2ee0368388dnvd
- git.kernel.org/stable/c/e697f466bf61280b7e996c9ea096d7ec371c31eanvd
- git.kernel.org/stable/c/e934737e18ff069a66cd53cd7f7a0b34ae2c24fenvd
- git.kernel.org/stable/c/ea64c727f20123342020257cfa956fbfbd6d12ffnvd
News mentions
0No linked articles in our index yet.