๐Ÿ” CVE Alert

CVE-2024-50153

MEDIUM 5.5

scsi: target: core: Fix null-ptr-deref in target_alloc_device()

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: scsi: target: core: Fix null-ptr-deref in target_alloc_device() There is a null-ptr-deref issue reported by KASAN: BUG: KASAN: null-ptr-deref in target_alloc_device+0xbc4/0xbe0 [target_core_mod] ... kasan_report+0xb9/0xf0 target_alloc_device+0xbc4/0xbe0 [target_core_mod] core_dev_setup_virtual_lun0+0xef/0x1f0 [target_core_mod] target_core_init_configfs+0x205/0x420 [target_core_mod] do_one_initcall+0xdd/0x4e0 ... entry_SYSCALL_64_after_hwframe+0x76/0x7e In target_alloc_device(), if allocing memory for dev queues fails, then dev will be freed by dev->transport->free_device(), but dev->transport is not initialized at that time, which will lead to a null pointer reference problem. Fixing this bug by freeing dev with hba->backend->ops->free_device().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 7, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
008b936bbde3e87a611b3828a0d5d2a4f99026a0 < 8c1e6717f60d31f8af3937c23c4f1498529584e1 1526d9f10c6184031e42afad0adbdde1213e8ad1 < 39e02fa90323243187c91bb3e8f2f5f6a9aacfc7 1526d9f10c6184031e42afad0adbdde1213e8ad1 < 895ab729425ef9bf3b6d2f8d0853abe64896f314 1526d9f10c6184031e42afad0adbdde1213e8ad1 < b80e9bc85bd9af378e7eac83e15dd129557bbdb6 1526d9f10c6184031e42afad0adbdde1213e8ad1 < 14a6a2adb440e4ae97bee73b2360946bd033dadd 1526d9f10c6184031e42afad0adbdde1213e8ad1 < fca6caeb4a61d240f031914413fcc69534f6dc03
Linux / Linux
5.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/8c1e6717f60d31f8af3937c23c4f1498529584e1 git.kernel.org: https://git.kernel.org/stable/c/39e02fa90323243187c91bb3e8f2f5f6a9aacfc7 git.kernel.org: https://git.kernel.org/stable/c/895ab729425ef9bf3b6d2f8d0853abe64896f314 git.kernel.org: https://git.kernel.org/stable/c/b80e9bc85bd9af378e7eac83e15dd129557bbdb6 git.kernel.org: https://git.kernel.org/stable/c/14a6a2adb440e4ae97bee73b2360946bd033dadd git.kernel.org: https://git.kernel.org/stable/c/fca6caeb4a61d240f031914413fcc69534f6dc03 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html