VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2023-54179

CVE-2023-54179

Description

In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Array index may go out of bound

Klocwork reports array 'vha->host_str' of size 16 may use index value(s) 16..19. Use snprintf() instead of sprintf().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's qla2xxx SCSI driver, an out-of-bounds array access in vha->host_str was fixed by replacing sprintf() with snprintf().

Vulnerability

CVE-2023-54179 is an out-of-bounds array index vulnerability in the Linux kernel's qla2xxx SCSI driver. The issue was reported by Klocwork static analysis, which identified that the array vha->host_str, defined with a size of 16, could be accessed using index values 16 through 19. This occurs because the code used sprintf() without length checking, allowing writes beyond the allocated buffer.

Exploitation

Exploitation requires no special privileges beyond the ability to trigger the vulnerable code path in the qla2xxx driver. The attack surface is local, as the driver is part of the kernel and accessible to users with sufficient permissions to interact with SCSI devices. The vulnerability is a classic buffer overflow caused by unbounded string formatting.

Impact

An attacker who successfully triggers the out-of-bounds write could corrupt adjacent kernel memory, potentially leading to system instability, denial of service, or privilege escalation. The exact impact depends on the memory layout and what data is overwritten.

Mitigation

The fix replaces sprintf() with snprintf(), which limits the number of bytes written to the array, preventing the out-of-bounds access. The patch has been applied to the stable kernel branches as referenced in the commit logs [1][2][3]. Users should update their kernels to include this fix.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

7

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.