Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2023-53124 |
CWE-ID | CWE-476 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU108448
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53124
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mpt3sas_transport_port_add() function in drivers/scsi/mpt3sas/mpt3sas_transport.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 5.4 - 6.3 rc6
CPE2.3https://git.kernel.org/stable/c/090305c36185c0547e4441d4c08f1cf096b32134
https://git.kernel.org/stable/c/6f0c2f70d9929208d8427ec72c3ed91e2251e289
https://git.kernel.org/stable/c/9937f784a608944107dcc2ba9a9c3333f8330b9e
https://git.kernel.org/stable/c/a26c775ccc4cfe46f9b718b51bd24313053c7e0b
https://git.kernel.org/stable/c/b5e5bbb3fa5f8412e96c5eda7f4a4af6241d6bd3
https://git.kernel.org/stable/c/d3c57724f1569311e4b81e98fad0931028b9bdcd
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.176
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.104
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.238
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.21
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.