In the Linux kernel, the following vulnerability has been resolved:
vdpa: Add max vqp attr to vdpa_nl_policy for nlattr length check
The vdpa_nl_policy structure is used to validate the nlattr when parsing
the incoming nlmsg. It will ensure the attribute being described produces
a valid nlattr pointer in info->attrs before entering into each handler
in vdpa_nl_ops.
That is to say, the missing part in vdpa_nl_policy may lead to illegal
nlattr after parsing, which could lead to OOB read just like CVE-2023-3773.
This patch adds the missing nla_policy for vdpa max vqp attr to avoid
such bugs.
Metrics
Affected Vendors & Products
References
History
Sat, 04 Oct 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: vdpa: Add max vqp attr to vdpa_nl_policy for nlattr length check The vdpa_nl_policy structure is used to validate the nlattr when parsing the incoming nlmsg. It will ensure the attribute being described produces a valid nlattr pointer in info->attrs before entering into each handler in vdpa_nl_ops. That is to say, the missing part in vdpa_nl_policy may lead to illegal nlattr after parsing, which could lead to OOB read just like CVE-2023-3773. This patch adds the missing nla_policy for vdpa max vqp attr to avoid such bugs. | |
Title | vdpa: Add max vqp attr to vdpa_nl_policy for nlattr length check | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-10-04T15:16:52.114Z
Reserved: 2025-10-04T15:14:15.920Z
Link: CVE-2023-53543

No data.

Status : Received
Published: 2025-10-04T16:15:49.413
Modified: 2025-10-04T16:15:49.413
Link: CVE-2023-53543

No data.

No data.