In the Linux kernel, the following vulnerability has been resolved:
scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()
fc_lport_ptp_setup() did not check the return value of fc_rport_create()
which can return NULL and would cause a NULL pointer dereference. Address
this issue by checking return value of fc_rport_create() and log error
message on fc_rport_create() failed.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/442fd24d7b6b29e4a9cd9225afba4142d5f522ba - Patch | |
References | () https://git.kernel.org/stable/c/4df105f0ce9f6f30cda4e99f577150d23f0c9c5f - Patch | |
References | () https://git.kernel.org/stable/c/56d78b5495ebecbb9395101f3be177cd0a52450b - Patch | |
References | () https://git.kernel.org/stable/c/6b9ecf4e1032e645873933e5b43cbb84cac19106 - Patch | |
References | () https://git.kernel.org/stable/c/77072ec41d6ab3718c3fc639bc149b8037caedfa - Patch | |
References | () https://git.kernel.org/stable/c/930f0aaba4820d6362de4e6ed569eaf444f1ea4e - Patch | |
References | () https://git.kernel.org/stable/c/b549acf999824d4f751ca57965700372f2f3ad00 - Patch | |
References | () https://git.kernel.org/stable/c/bb83f79f90e92f46466adcfd4fd264a7ae0f0f01 - Patch | |
References | () https://git.kernel.org/stable/c/f6fe7261b92b21109678747f36df9fdab1e30c34 - Patch |
24 May 2024, 01:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux linux Kernel
Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-476 | |
Summary |
|
|
References | () https://git.kernel.org/stable/c/442fd24d7b6b29e4a9cd9225afba4142d5f522ba - Patch | |
References | () https://git.kernel.org/stable/c/4df105f0ce9f6f30cda4e99f577150d23f0c9c5f - Patch | |
References | () https://git.kernel.org/stable/c/56d78b5495ebecbb9395101f3be177cd0a52450b - Patch | |
References | () https://git.kernel.org/stable/c/6b9ecf4e1032e645873933e5b43cbb84cac19106 - Patch | |
References | () https://git.kernel.org/stable/c/77072ec41d6ab3718c3fc639bc149b8037caedfa - Patch | |
References | () https://git.kernel.org/stable/c/930f0aaba4820d6362de4e6ed569eaf444f1ea4e - Patch | |
References | () https://git.kernel.org/stable/c/b549acf999824d4f751ca57965700372f2f3ad00 - Patch | |
References | () https://git.kernel.org/stable/c/bb83f79f90e92f46466adcfd4fd264a7ae0f0f01 - Patch | |
References | () https://git.kernel.org/stable/c/f6fe7261b92b21109678747f36df9fdab1e30c34 - Patch |
21 May 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-21 16:15
Updated : 2024-11-21 08:40
NVD link : CVE-2023-52809
Mitre link : CVE-2023-52809
CVE.ORG link : CVE-2023-52809
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference