-

CVE-2023-53456

In the Linux kernel, the following vulnerability has been resolved:

scsi: qla4xxx: Add length check when parsing nlattrs

There are three places that qla4xxx parses nlattrs:

 - qla4xxx_set_chap_entry()

 - qla4xxx_iface_set_param()

 - qla4xxx_sysfs_ddb_set_param()

and each of them directly converts the nlattr to specific pointer of
structure without length checking. This could be dangerous as those
attributes are not validated and a malformed nlattr (e.g., length 0) could
result in an OOB read that leaks heap dirty data.

Add the nla_len check before accessing the nlattr data and return EINVAL if
the length check fails.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < cfa6a1a79ed6d336fac7a5d87eb5471e4401829f
Version 00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80
Status affected
Version < 5925e224cc6edfef57b20447f18323208461309b
Version 00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80
Status affected
Version < 47f3be62eab50b8cd7e1ae5fc2c4dae687497c34
Version 00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80
Status affected
Version < 6d65079c69dc1feb817ed71f5bd15e83a7d6832d
Version 00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80
Status affected
Version < f61fc650c47849637fa1771a31a11674c824138a
Version 00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80
Status affected
Version < 25feffb3fbd51ae81d92c65cebc0e932663828b3
Version 00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80
Status affected
Version < 4ed21975311247bb84e82298eeb359ec0a0fa84d
Version 00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80
Status affected
Version < b018c0440b871d8b001c996e95fa4538bd292de6
Version 00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80
Status affected
Version < 47cd3770e31df942e2bb925a9a855c79ed0662eb
Version 00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 3.2
Status affected
Version < 3.2
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.326
Status unaffected
Version <= 4.19.*
Version 4.19.295
Status unaffected
Version <= 5.4.*
Version 5.4.257
Status unaffected
Version <= 5.10.*
Version 5.10.195
Status unaffected
Version <= 5.15.*
Version 5.15.132
Status unaffected
Version <= 6.1.*
Version 6.1.53
Status unaffected
Version <= 6.4.*
Version 6.4.16
Status unaffected
Version <= 6.5.*
Version 6.5.3
Status unaffected
Version <= *
Version 6.6
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.05% 0.151
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string