CVE-2023-53456
EUVD-2025-3279901.10.2025, 12:15
In the Linux kernel, the following vulnerability has been resolved: scsi: qla4xxx: Add length check when parsing nlattrs There are three places that qla4xxx parses nlattrs: - qla4xxx_set_chap_entry() - qla4xxx_iface_set_param() - qla4xxx_sysfs_ddb_set_param() and each of them directly converts the nlattr to specific pointer of structure without length checking. This could be dangerous as those attributes are not validated and a malformed nlattr (e.g., length 0) could result in an OOB read that leaks heap dirty data. Add the nla_len check before accessing the nlattr data and return EINVAL if the length check fails.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 3.2 ≤ 𝑥 < 4.14.326 |
| linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.295 |
| linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.257 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.195 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.132 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.53 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.4.16 |
| linux | linux_kernel | 6.5 ≤ 𝑥 < 6.5.3 |
𝑥
= Vulnerable software versions
Debian Releases
References