{"id":"CVE-2023-53124","summary":"scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add()\n\nPort is allocated by sas_port_alloc_num() and rphy is allocated by either\nsas_end_device_alloc() or sas_expander_alloc(), all of which may return\nNULL. So we need to check the rphy to avoid possible NULL pointer access.\n\nIf sas_rphy_add() returned with failure, rphy is set to NULL. We would\naccess the rphy in the following lines which would also result NULL pointer\naccess.","modified":"2026-04-03T13:14:25.670975Z","published":"2025-05-02T15:56:00.500Z","related":["SUSE-SU-2025:01918-1","SUSE-SU-2025:01966-1","SUSE-SU-2025:01983-1","SUSE-SU-2025:02173-1","SUSE-SU-2025:02262-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53124.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/090305c36185c0547e4441d4c08f1cf096b32134"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6f0c2f70d9929208d8427ec72c3ed91e2251e289"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9937f784a608944107dcc2ba9a9c3333f8330b9e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a26c775ccc4cfe46f9b718b51bd24313053c7e0b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b5e5bbb3fa5f8412e96c5eda7f4a4af6241d6bd3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d3c57724f1569311e4b81e98fad0931028b9bdcd"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53124.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53124"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d60000cb1195a464080b0efb4949daf7594e0020"},{"fixed":"090305c36185c0547e4441d4c08f1cf096b32134"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"ce1a69cc85006b494353911b35171da195d79e25"},{"fixed":"6f0c2f70d9929208d8427ec72c3ed91e2251e289"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"6a92129c8f999ff5b122c100ce7f625eb3e98c4b"},{"fixed":"9937f784a608944107dcc2ba9a9c3333f8330b9e"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d17bca3ddfe507874cb826d32721552da12e741f"},{"fixed":"b5e5bbb3fa5f8412e96c5eda7f4a4af6241d6bd3"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"78316e9dfc24906dd474630928ed1d3c562b568e"},{"fixed":"a26c775ccc4cfe46f9b718b51bd24313053c7e0b"},{"fixed":"d3c57724f1569311e4b81e98fad0931028b9bdcd"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"6f6768e2fc8638fabdd8802c2ef693d7aef01db1"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53124.json"}}],"schema_version":"1.7.5"}