CVE-2023-53456
MEDIUMLinux kernel - Memory Corruption
Title source: llmDescription
In the Linux kernel, the following vulnerability has been resolved: scsi: qla4xxx: Add length check when parsing nlattrs There are three places that qla4xxx parses nlattrs: - qla4xxx_set_chap_entry() - qla4xxx_iface_set_param() - qla4xxx_sysfs_ddb_set_param() and each of them directly converts the nlattr to specific pointer of structure without length checking. This could be dangerous as those attributes are not validated and a malformed nlattr (e.g., length 0) could result in an OOB read that leaks heap dirty data. Add the nla_len check before accessing the nlattr data and return EINVAL if the length check fails.
References (9)
Scores
CVSS v3
5.5
EPSS
0.0001
EPSS Percentile
2.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Classification
Status
published
Affected Products (1)
linux/linux_kernel
< 4.14.326
Timeline
Published
Oct 01, 2025
Tracked Since
Feb 18, 2026