-
CVE-2023-53456
- EPSS 0.05%
- Published 01.10.2025 12:15:45
- Last modified 02.10.2025 19:12:17
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: scsi: qla4xxx: Add length check when parsing nlattrs There are three places that qla4xxx parses nlattrs: - qla4xxx_set_chap_entry() - qla4xxx_iface_set_param() - qla4xxx_sysfs_ddb_set_param() and each of them directly converts the nlattr to specific pointer of structure without length checking. This could be dangerous as those attributes are not validated and a malformed nlattr (e.g., length 0) could result in an OOB read that leaks heap dirty data. Add the nla_len check before accessing the nlattr data and return EINVAL if the length check fails.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
cfa6a1a79ed6d336fac7a5d87eb5471e4401829f
Version
00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80
Status
affected
Version <
5925e224cc6edfef57b20447f18323208461309b
Version
00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80
Status
affected
Version <
47f3be62eab50b8cd7e1ae5fc2c4dae687497c34
Version
00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80
Status
affected
Version <
6d65079c69dc1feb817ed71f5bd15e83a7d6832d
Version
00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80
Status
affected
Version <
f61fc650c47849637fa1771a31a11674c824138a
Version
00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80
Status
affected
Version <
25feffb3fbd51ae81d92c65cebc0e932663828b3
Version
00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80
Status
affected
Version <
4ed21975311247bb84e82298eeb359ec0a0fa84d
Version
00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80
Status
affected
Version <
b018c0440b871d8b001c996e95fa4538bd292de6
Version
00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80
Status
affected
Version <
47cd3770e31df942e2bb925a9a855c79ed0662eb
Version
00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
3.2
Status
affected
Version <
3.2
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.326
Status
unaffected
Version <=
4.19.*
Version
4.19.295
Status
unaffected
Version <=
5.4.*
Version
5.4.257
Status
unaffected
Version <=
5.10.*
Version
5.10.195
Status
unaffected
Version <=
5.15.*
Version
5.15.132
Status
unaffected
Version <=
6.1.*
Version
6.1.53
Status
unaffected
Version <=
6.4.*
Version
6.4.16
Status
unaffected
Version <=
6.5.*
Version
6.5.3
Status
unaffected
Version <=
*
Version
6.6
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.151 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|