Bug 2363714 (CVE-2023-53124) - CVE-2023-53124 kernel: scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add()
Summary: CVE-2023-53124 kernel: scsi: mpt3sas: Fix NULL pointer access in mpt3sas_tran...
Keywords:
Status: NEW
Alias: CVE-2023-53124
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-05-02 16:02 UTC by OSIDB Bzimport
Modified: 2025-05-05 09:20 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-05-02 16:02:53 UTC
In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add()

Port is allocated by sas_port_alloc_num() and rphy is allocated by either
sas_end_device_alloc() or sas_expander_alloc(), all of which may return
NULL. So we need to check the rphy to avoid possible NULL pointer access.

If sas_rphy_add() returned with failure, rphy is set to NULL. We would
access the rphy in the following lines which would also result NULL pointer
access.

Comment 1 Avinash Hanwate 2025-05-05 06:37:54 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025050232-CVE-2023-53124-9900@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.