Metrics
Affected Vendors & Products
Tue, 17 Jun 2025 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Sat, 07 Jun 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 05 May 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 02 May 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Bad drive in topology results kernel crash When the SAS Transport Layer support is enabled and a device exposed to the OS by the driver fails INQUIRY commands, the driver frees up the memory allocated for an internal HBA port data structure. However, in some places, the reference to the freed memory is not cleared. When the firmware sends the Device Info change event for the same device again, the freed memory is accessed and that leads to memory corruption and OS crash. | |
Title | scsi: mpi3mr: Bad drive in topology results kernel crash | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-05-02T15:54:56.229Z
Updated: 2025-05-12T14:19:20.588Z
Reserved: 2025-03-27T16:40:15.763Z
Link: CVE-2023-53037

No data.

Status : Awaiting Analysis
Published: 2025-05-02T16:15:22.827
Modified: 2025-05-05T20:54:45.973
Link: CVE-2023-53037
