{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-53456","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-09-17T14:54:09.754Z","datePublished":"2025-10-01T11:42:27.821Z","dateUpdated":"2026-05-11T19:45:21.497Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:45:21.497Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla4xxx: Add length check when parsing nlattrs\n\nThere are three places that qla4xxx parses nlattrs:\n\n - qla4xxx_set_chap_entry()\n\n - qla4xxx_iface_set_param()\n\n - qla4xxx_sysfs_ddb_set_param()\n\nand each of them directly converts the nlattr to specific pointer of\nstructure without length checking. This could be dangerous as those\nattributes are not validated and a malformed nlattr (e.g., length 0) could\nresult in an OOB read that leaks heap dirty data.\n\nAdd the nla_len check before accessing the nlattr data and return EINVAL if\nthe length check fails."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/scsi/qla4xxx/ql4_os.c"],"versions":[{"version":"00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80","lessThan":"cfa6a1a79ed6d336fac7a5d87eb5471e4401829f","status":"affected","versionType":"git"},{"version":"00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80","lessThan":"5925e224cc6edfef57b20447f18323208461309b","status":"affected","versionType":"git"},{"version":"00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80","lessThan":"47f3be62eab50b8cd7e1ae5fc2c4dae687497c34","status":"affected","versionType":"git"},{"version":"00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80","lessThan":"6d65079c69dc1feb817ed71f5bd15e83a7d6832d","status":"affected","versionType":"git"},{"version":"00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80","lessThan":"f61fc650c47849637fa1771a31a11674c824138a","status":"affected","versionType":"git"},{"version":"00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80","lessThan":"25feffb3fbd51ae81d92c65cebc0e932663828b3","status":"affected","versionType":"git"},{"version":"00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80","lessThan":"4ed21975311247bb84e82298eeb359ec0a0fa84d","status":"affected","versionType":"git"},{"version":"00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80","lessThan":"b018c0440b871d8b001c996e95fa4538bd292de6","status":"affected","versionType":"git"},{"version":"00c31889f7513e9ffa6b2b4de8ad6d7f59a61c80","lessThan":"47cd3770e31df942e2bb925a9a855c79ed0662eb","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/scsi/qla4xxx/ql4_os.c"],"versions":[{"version":"3.2","status":"affected"},{"version":"0","lessThan":"3.2","status":"unaffected","versionType":"semver"},{"version":"4.14.326","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.295","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.257","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.195","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.132","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.53","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.4.16","lessThanOrEqual":"6.4.*","status":"unaffected","versionType":"semver"},{"version":"6.5.3","lessThanOrEqual":"6.5.*","status":"unaffected","versionType":"semver"},{"version":"6.6","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndExcluding":"4.14.326"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndExcluding":"4.19.295"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndExcluding":"5.4.257"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndExcluding":"5.10.195"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndExcluding":"5.15.132"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndExcluding":"6.1.53"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndExcluding":"6.4.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndExcluding":"6.5.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2","versionEndExcluding":"6.6"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/cfa6a1a79ed6d336fac7a5d87eb5471e4401829f"},{"url":"https://git.kernel.org/stable/c/5925e224cc6edfef57b20447f18323208461309b"},{"url":"https://git.kernel.org/stable/c/47f3be62eab50b8cd7e1ae5fc2c4dae687497c34"},{"url":"https://git.kernel.org/stable/c/6d65079c69dc1feb817ed71f5bd15e83a7d6832d"},{"url":"https://git.kernel.org/stable/c/f61fc650c47849637fa1771a31a11674c824138a"},{"url":"https://git.kernel.org/stable/c/25feffb3fbd51ae81d92c65cebc0e932663828b3"},{"url":"https://git.kernel.org/stable/c/4ed21975311247bb84e82298eeb359ec0a0fa84d"},{"url":"https://git.kernel.org/stable/c/b018c0440b871d8b001c996e95fa4538bd292de6"},{"url":"https://git.kernel.org/stable/c/47cd3770e31df942e2bb925a9a855c79ed0662eb"}],"title":"scsi: qla4xxx: Add length check when parsing nlattrs","x_generator":{"engine":"bippy-1.2.0"}}}}