We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add() Port is allocated by sas_port_alloc_num() and rphy is allocated by either sas_end_device_alloc() or sas_expander_alloc(), all of which may return NULL. So we need to check the rphy to avoid possible NULL pointer access. If sas_rphy_add() returned with failure, rphy is set to NULL. We would access the rphy in the following lines which would also result NULL pointer access.
Reserved 2025-05-02 | Published 2025-05-02 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/090305c36185c0547e4441d4c08f1cf096b32134
git.kernel.org/...c/6f0c2f70d9929208d8427ec72c3ed91e2251e289
git.kernel.org/...c/9937f784a608944107dcc2ba9a9c3333f8330b9e
git.kernel.org/...c/b5e5bbb3fa5f8412e96c5eda7f4a4af6241d6bd3
git.kernel.org/...c/a26c775ccc4cfe46f9b718b51bd24313053c7e0b
git.kernel.org/...c/d3c57724f1569311e4b81e98fad0931028b9bdcd
Support options