Логотип exploitDog
bind:"GHSA-2px8-v868-2g2q" OR bind:"CVE-2023-53037"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-2px8-v868-2g2q" OR bind:"CVE-2023-53037"

Количество 8

Количество 8

github логотип

GHSA-2px8-v868-2g2q

11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Bad drive in topology results kernel crash When the SAS Transport Layer support is enabled and a device exposed to the OS by the driver fails INQUIRY commands, the driver frees up the memory allocated for an internal HBA port data structure. However, in some places, the reference to the freed memory is not cleared. When the firmware sends the Device Info change event for the same device again, the freed memory is accessed and that leads to memory corruption and OS crash.

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2023-53037

11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Bad drive in topology results kernel crash When the SAS Transport Layer support is enabled and a device exposed to the OS by the driver fails INQUIRY commands, the driver frees up the memory allocated for an internal HBA port data structure. However, in some places, the reference to the freed memory is not cleared. When the firmware sends the Device Info change event for the same device again, the freed memory is accessed and that leads to memory corruption and OS crash.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2023-53037

11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Bad drive in topology results kernel crash When the SAS Transport Layer support is enabled and a device exposed to the OS by the driver fails INQUIRY commands, the driver frees up the memory allocated for an internal HBA port data structure. However, in some places, the reference to the freed memory is not cleared. When the firmware sends the Device Info change event for the same device again, the freed memory is accessed and that leads to memory corruption and OS crash.

CVSS3: 4.1
EPSS: Низкий
nvd логотип

CVE-2023-53037

11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Bad drive in topology results kernel crash When the SAS Transport Layer support is enabled and a device exposed to the OS by the driver fails INQUIRY commands, the driver frees up the memory allocated for an internal HBA port data structure. However, in some places, the reference to the freed memory is not cleared. When the firmware sends the Device Info change event for the same device again, the freed memory is accessed and that leads to memory corruption and OS crash.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2023-53037

5 месяцев назад

scsi: mpi3mr: Bad drive in topology results kernel crash

EPSS: Низкий
debian логотип

CVE-2023-53037

11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: s ...

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2025-05363

около 3 лет назад

Уязвимость компонента scsi ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8
EPSS: Низкий
redos логотип

ROS-20260128-73-0005

2 месяца назад

Уязвимость kernel-lt

CVSS3: 8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-2px8-v868-2g2q

In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Bad drive in topology results kernel crash When the SAS Transport Layer support is enabled and a device exposed to the OS by the driver fails INQUIRY commands, the driver frees up the memory allocated for an internal HBA port data structure. However, in some places, the reference to the freed memory is not cleared. When the firmware sends the Device Info change event for the same device again, the freed memory is accessed and that leads to memory corruption and OS crash.

CVSS3: 7.8
0%
Низкий
11 месяцев назад
ubuntu логотип
CVE-2023-53037

In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Bad drive in topology results kernel crash When the SAS Transport Layer support is enabled and a device exposed to the OS by the driver fails INQUIRY commands, the driver frees up the memory allocated for an internal HBA port data structure. However, in some places, the reference to the freed memory is not cleared. When the firmware sends the Device Info change event for the same device again, the freed memory is accessed and that leads to memory corruption and OS crash.

CVSS3: 7.8
0%
Низкий
11 месяцев назад
redhat логотип
CVE-2023-53037

In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Bad drive in topology results kernel crash When the SAS Transport Layer support is enabled and a device exposed to the OS by the driver fails INQUIRY commands, the driver frees up the memory allocated for an internal HBA port data structure. However, in some places, the reference to the freed memory is not cleared. When the firmware sends the Device Info change event for the same device again, the freed memory is accessed and that leads to memory corruption and OS crash.

CVSS3: 4.1
0%
Низкий
11 месяцев назад
nvd логотип
CVE-2023-53037

In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Bad drive in topology results kernel crash When the SAS Transport Layer support is enabled and a device exposed to the OS by the driver fails INQUIRY commands, the driver frees up the memory allocated for an internal HBA port data structure. However, in some places, the reference to the freed memory is not cleared. When the firmware sends the Device Info change event for the same device again, the freed memory is accessed and that leads to memory corruption and OS crash.

CVSS3: 7.8
0%
Низкий
11 месяцев назад
msrc логотип
CVE-2023-53037

scsi: mpi3mr: Bad drive in topology results kernel crash

0%
Низкий
5 месяцев назад
debian логотип
CVE-2023-53037

In the Linux kernel, the following vulnerability has been resolved: s ...

CVSS3: 7.8
0%
Низкий
11 месяцев назад
fstec логотип
BDU:2025-05363

Уязвимость компонента scsi ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8
0%
Низкий
около 3 лет назад
redos логотип
ROS-20260128-73-0005

Уязвимость kernel-lt

CVSS3: 8
0%
Низкий
2 месяца назад

Уязвимостей на страницу