In the Linux kernel, the following vulnerability has been resolved:
scsi: mpi3mr: Bad drive in topology results kernel crash
When the SAS Transport Layer support is enabled and a device exposed to the OS by the driver fails INQUIRY commands, the driver frees up the memory allocated for an internal HBA port data structure. However, in some places, the reference to the freed memory is not cleared. When the firmware sends the Device Info change event for the same device again, the freed memory is accessed and that leads to memory corruption and OS crash.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8e45183978d64699df639e795235433a60f35047",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-53037-03275b64",
"target": {
"file": "drivers/scsi/mpi3mr/mpi3mr_transport.c"
},
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"60297090818441394504147465620915229786",
"261760072569824504918763564699205555844",
"82943021756936540109187474514140069669",
"27281491215312023232597553986045768996",
"96778780342029008594915611644869130212",
"240309907595009038406931232066869412102",
"328534822295585106734712326387539359211",
"108815785430746726889310226176828315306",
"259490003311279048279718727224372444548",
"24532586413290199940169740201164407756",
"327075594907428744512463726914564972384",
"246221264908679397970173494925299090954",
"296380742189971471152006291005482704232",
"225573121958511270321887770714987995076",
"236148594094481479063063620350032403868",
"337682899055272791202703988204276620073",
"232628327650448111847522588581823001751",
"272435980014766780495369847168179807177",
"126828491695768894810273402574561262569",
"336578775992898420276924808023524558817"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8e45183978d64699df639e795235433a60f35047",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-53037-0e2a6497",
"target": {
"function": "mpi3mr_report_tgtdev_to_sas_transport",
"file": "drivers/scsi/mpi3mr/mpi3mr_transport.c"
},
"signature_type": "Function",
"digest": {
"length": 1258.0,
"function_hash": "68599275764771952599151967981231649349"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aa11e4b6cdb403b9fdef6939550f6b36dd61624d",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-53037-299caaa9",
"target": {
"function": "mpi3mr_report_tgtdev_to_sas_transport",
"file": "drivers/scsi/mpi3mr/mpi3mr_transport.c"
},
"signature_type": "Function",
"digest": {
"length": 1258.0,
"function_hash": "68599275764771952599151967981231649349"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1f822ae8fb2a20fffa71e9bfa9b203c03d72d3ba",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-53037-5133f32d",
"target": {
"function": "mpi3mr_get_port_id_by_rphy",
"file": "drivers/scsi/mpi3mr/mpi3mr_transport.c"
},
"signature_type": "Function",
"digest": {
"length": 852.0,
"function_hash": "234259437547616873315646176048683532464"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aa11e4b6cdb403b9fdef6939550f6b36dd61624d",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-53037-579d3416",
"target": {
"function": "mpi3mr_get_port_id_by_rphy",
"file": "drivers/scsi/mpi3mr/mpi3mr_transport.c"
},
"signature_type": "Function",
"digest": {
"length": 852.0,
"function_hash": "234259437547616873315646176048683532464"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8e45183978d64699df639e795235433a60f35047",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-53037-6ca85e3a",
"target": {
"function": "mpi3mr_remove_tgtdev_from_sas_transport",
"file": "drivers/scsi/mpi3mr/mpi3mr_transport.c"
},
"signature_type": "Function",
"digest": {
"length": 398.0,
"function_hash": "125993920785164398268241419249726405062"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aa11e4b6cdb403b9fdef6939550f6b36dd61624d",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-53037-88377092",
"target": {
"file": "drivers/scsi/mpi3mr/mpi3mr_transport.c"
},
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"60297090818441394504147465620915229786",
"261760072569824504918763564699205555844",
"82943021756936540109187474514140069669",
"27281491215312023232597553986045768996",
"96778780342029008594915611644869130212",
"240309907595009038406931232066869412102",
"328534822295585106734712326387539359211",
"108815785430746726889310226176828315306",
"259490003311279048279718727224372444548",
"24532586413290199940169740201164407756",
"327075594907428744512463726914564972384",
"246221264908679397970173494925299090954",
"296380742189971471152006291005482704232",
"225573121958511270321887770714987995076",
"236148594094481479063063620350032403868",
"337682899055272791202703988204276620073",
"232628327650448111847522588581823001751",
"272435980014766780495369847168179807177",
"126828491695768894810273402574561262569",
"336578775992898420276924808023524558817"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1f822ae8fb2a20fffa71e9bfa9b203c03d72d3ba",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-53037-8aa44ec4",
"target": {
"function": "mpi3mr_remove_tgtdev_from_sas_transport",
"file": "drivers/scsi/mpi3mr/mpi3mr_transport.c"
},
"signature_type": "Function",
"digest": {
"length": 398.0,
"function_hash": "125993920785164398268241419249726405062"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aa11e4b6cdb403b9fdef6939550f6b36dd61624d",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-53037-8cae0b87",
"target": {
"function": "mpi3mr_remove_tgtdev_from_sas_transport",
"file": "drivers/scsi/mpi3mr/mpi3mr_transport.c"
},
"signature_type": "Function",
"digest": {
"length": 398.0,
"function_hash": "125993920785164398268241419249726405062"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8e45183978d64699df639e795235433a60f35047",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-53037-8d563442",
"target": {
"function": "mpi3mr_get_port_id_by_rphy",
"file": "drivers/scsi/mpi3mr/mpi3mr_transport.c"
},
"signature_type": "Function",
"digest": {
"length": 852.0,
"function_hash": "234259437547616873315646176048683532464"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1f822ae8fb2a20fffa71e9bfa9b203c03d72d3ba",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-53037-d0a84ba8",
"target": {
"function": "mpi3mr_report_tgtdev_to_sas_transport",
"file": "drivers/scsi/mpi3mr/mpi3mr_transport.c"
},
"signature_type": "Function",
"digest": {
"length": 1258.0,
"function_hash": "68599275764771952599151967981231649349"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1f822ae8fb2a20fffa71e9bfa9b203c03d72d3ba",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2023-53037-fb16a79f",
"target": {
"file": "drivers/scsi/mpi3mr/mpi3mr_transport.c"
},
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"60297090818441394504147465620915229786",
"261760072569824504918763564699205555844",
"82943021756936540109187474514140069669",
"27281491215312023232597553986045768996",
"96778780342029008594915611644869130212",
"240309907595009038406931232066869412102",
"328534822295585106734712326387539359211",
"108815785430746726889310226176828315306",
"259490003311279048279718727224372444548",
"24532586413290199940169740201164407756",
"327075594907428744512463726914564972384",
"246221264908679397970173494925299090954",
"296380742189971471152006291005482704232",
"225573121958511270321887770714987995076",
"236148594094481479063063620350032403868",
"337682899055272791202703988204276620073",
"232628327650448111847522588581823001751",
"272435980014766780495369847168179807177",
"126828491695768894810273402574561262569",
"336578775992898420276924808023524558817"
]
}
}
]