In the Linux kernel, the following vulnerability has been resolved:
scsi: qla4xxx: Add length check when parsing nlattrs
There are three places that qla4xxx parses nlattrs:
- qla4xxx_set_chap_entry()
- qla4xxx_iface_set_param()
- qla4xxx_sysfs_ddb_set_param()
and each of them directly converts the nlattr to specific pointer of
structure without length checking. This could be dangerous as those
attributes are not validated and a malformed nlattr (e.g., length 0) could
result in an OOB read that leaks heap dirty data.
Add the nla_len check before accessing the nlattr data and return EINVAL if
the length check fails.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-10-01 12:15
Updated : 2026-01-16 21:09
NVD link : CVE-2023-53456
Mitre link : CVE-2023-53456
CVE.ORG link : CVE-2023-53456
JSON object : View
Products Affected
linux
- linux_kernel
CWE
