In the Linux kernel, the following vulnerability has been resolved:
scsi: lpfc: Check kzalloc() in lpfc_sli4_cgn_params_read()
If kzalloc() fails in lpfc_sli4_cgn_params_read(), then we rely on
lpfc_read_object()'s routine to NULL check pdata.
Currently, an early return error is thrown from lpfc_read_object() to
protect us from NULL ptr dereference, but the errno code is -ENODEV.
Change the errno code to a more appropriate -ENOMEM.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-05-02 16:15
Updated : 2025-11-12 19:14
NVD link : CVE-2023-53038
Mitre link : CVE-2023-53038
CVE.ORG link : CVE-2023-53038
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
