CVE-2023-53124

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
02/05/2025
Last modified:
10/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add()<br /> <br /> Port is allocated by sas_port_alloc_num() and rphy is allocated by either<br /> sas_end_device_alloc() or sas_expander_alloc(), all of which may return<br /> NULL. So we need to check the rphy to avoid possible NULL pointer access.<br /> <br /> If sas_rphy_add() returned with failure, rphy is set to NULL. We would<br /> access the rphy in the following lines which would also result NULL pointer<br /> access.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.4.229 (including) 5.4.238 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.10.163 (including) 5.10.176 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.15.86 (including) 5.15.104 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.0.16 (including) 6.1 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.1.2 (including) 6.1.21 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.2.8 (excluding)
cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*