CVE-2023-52809

In the Linux kernel, the following vulnerability has been resolved: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() fc_lport_ptp_setup() did not check the return value of fc_rport_create() which can return NULL and would cause a NULL pointer dereference. Address this issue by checking return value of fc_rport_create() and log error message on fc_rport_create() failed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/442fd24d7b6b29e4a9cd9225afba4142d5f522ba - Patch () https://git.kernel.org/stable/c/442fd24d7b6b29e4a9cd9225afba4142d5f522ba - Patch
References () https://git.kernel.org/stable/c/4df105f0ce9f6f30cda4e99f577150d23f0c9c5f - Patch () https://git.kernel.org/stable/c/4df105f0ce9f6f30cda4e99f577150d23f0c9c5f - Patch
References () https://git.kernel.org/stable/c/56d78b5495ebecbb9395101f3be177cd0a52450b - Patch () https://git.kernel.org/stable/c/56d78b5495ebecbb9395101f3be177cd0a52450b - Patch
References () https://git.kernel.org/stable/c/6b9ecf4e1032e645873933e5b43cbb84cac19106 - Patch () https://git.kernel.org/stable/c/6b9ecf4e1032e645873933e5b43cbb84cac19106 - Patch
References () https://git.kernel.org/stable/c/77072ec41d6ab3718c3fc639bc149b8037caedfa - Patch () https://git.kernel.org/stable/c/77072ec41d6ab3718c3fc639bc149b8037caedfa - Patch
References () https://git.kernel.org/stable/c/930f0aaba4820d6362de4e6ed569eaf444f1ea4e - Patch () https://git.kernel.org/stable/c/930f0aaba4820d6362de4e6ed569eaf444f1ea4e - Patch
References () https://git.kernel.org/stable/c/b549acf999824d4f751ca57965700372f2f3ad00 - Patch () https://git.kernel.org/stable/c/b549acf999824d4f751ca57965700372f2f3ad00 - Patch
References () https://git.kernel.org/stable/c/bb83f79f90e92f46466adcfd4fd264a7ae0f0f01 - Patch () https://git.kernel.org/stable/c/bb83f79f90e92f46466adcfd4fd264a7ae0f0f01 - Patch
References () https://git.kernel.org/stable/c/f6fe7261b92b21109678747f36df9fdab1e30c34 - Patch () https://git.kernel.org/stable/c/f6fe7261b92b21109678747f36df9fdab1e30c34 - Patch

24 May 2024, 01:14

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: scsi: libfc: corrigió la posible desreferencia del puntero NULL en fc_lport_ptp_setup() fc_lport_ptp_setup() no verificó el valor de retorno de fc_rport_create() que puede devolver NULL y causaría una desreferencia del puntero NULL. Solucione este problema verificando el valor de retorno de fc_rport_create() y el mensaje de error de registro en fc_rport_create() falló.
References () https://git.kernel.org/stable/c/442fd24d7b6b29e4a9cd9225afba4142d5f522ba - () https://git.kernel.org/stable/c/442fd24d7b6b29e4a9cd9225afba4142d5f522ba - Patch
References () https://git.kernel.org/stable/c/4df105f0ce9f6f30cda4e99f577150d23f0c9c5f - () https://git.kernel.org/stable/c/4df105f0ce9f6f30cda4e99f577150d23f0c9c5f - Patch
References () https://git.kernel.org/stable/c/56d78b5495ebecbb9395101f3be177cd0a52450b - () https://git.kernel.org/stable/c/56d78b5495ebecbb9395101f3be177cd0a52450b - Patch
References () https://git.kernel.org/stable/c/6b9ecf4e1032e645873933e5b43cbb84cac19106 - () https://git.kernel.org/stable/c/6b9ecf4e1032e645873933e5b43cbb84cac19106 - Patch
References () https://git.kernel.org/stable/c/77072ec41d6ab3718c3fc639bc149b8037caedfa - () https://git.kernel.org/stable/c/77072ec41d6ab3718c3fc639bc149b8037caedfa - Patch
References () https://git.kernel.org/stable/c/930f0aaba4820d6362de4e6ed569eaf444f1ea4e - () https://git.kernel.org/stable/c/930f0aaba4820d6362de4e6ed569eaf444f1ea4e - Patch
References () https://git.kernel.org/stable/c/b549acf999824d4f751ca57965700372f2f3ad00 - () https://git.kernel.org/stable/c/b549acf999824d4f751ca57965700372f2f3ad00 - Patch
References () https://git.kernel.org/stable/c/bb83f79f90e92f46466adcfd4fd264a7ae0f0f01 - () https://git.kernel.org/stable/c/bb83f79f90e92f46466adcfd4fd264a7ae0f0f01 - Patch
References () https://git.kernel.org/stable/c/f6fe7261b92b21109678747f36df9fdab1e30c34 - () https://git.kernel.org/stable/c/f6fe7261b92b21109678747f36df9fdab1e30c34 - Patch

21 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 16:15

Updated : 2024-11-21 08:40


NVD link : CVE-2023-52809

Mitre link : CVE-2023-52809

CVE.ORG link : CVE-2023-52809


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference