CVE-2023-53456

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/10/2025
Last modified:
16/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: qla4xxx: Add length check when parsing nlattrs<br /> <br /> There are three places that qla4xxx parses nlattrs:<br /> <br /> - qla4xxx_set_chap_entry()<br /> <br /> - qla4xxx_iface_set_param()<br /> <br /> - qla4xxx_sysfs_ddb_set_param()<br /> <br /> and each of them directly converts the nlattr to specific pointer of<br /> structure without length checking. This could be dangerous as those<br /> attributes are not validated and a malformed nlattr (e.g., length 0) could<br /> result in an OOB read that leaks heap dirty data.<br /> <br /> Add the nla_len check before accessing the nlattr data and return EINVAL if<br /> the length check fails.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.2 (including) 4.14.326 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.295 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.257 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.195 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.132 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.53 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.4.16 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.5 (including) 6.5.3 (excluding)