CVE-2023-54014
Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport()
Klocwork reported warning of rport maybe NULL and will be dereferenced. rport returned by call to fc_bsg_to_rport() could be NULL and dereferenced.
Check valid rport returned by fc_bsg_to_rport().
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A null-pointer dereference in the Linux kernel's qla2xxx SCSI driver, where fc_bsg_to_rport() can return NULL and then dereference a NULL rport.
Vulnerability
CVE-2023-54014 is a null-pointer dereference vulnerability in the Linux kernel's qla2xxx SCSI driver. The issue was identified by Klocwork static analysis, which warned that the rport pointer returned by the fc_bsg_to_rport() function could be NULL and subsequently dereferenced without a proper check [1][2][3].
Exploitation
An attacker with the ability to trigger the vulnerable code path in the qla2xxx driver, likely through a crafted Fibre Channel (FC) request via the BSG (block SCSI generic) interface. No authentication is required beyond the ability to send such requests to the driver. The attack surface is limited to systems with the qla2xxx driver loaded and accessible to unprivileged users or remote attackers who can send FC frames.
Impact
If successfully exploited, this bug could cause a kernel crash (denial of service) due to dereferencing a NULL pointer. In some configurations, it might be leveraged for privilege escalation if the NULL pointer dereference occurs in a context where an attacker can control the memory layout. However, the primary impact is system instability and denial of service.
Mitigation
The fix is included in the Linux kernel stable updates. Patches are available in the kernel git repository [1][2][3]. Users should apply the latest kernel updates from their distribution to remediate this vulnerability.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
8f35bd94b4e11ccd3bc595bda1b7e5bdf2be2921d684462551ccd52b790a6e466930717efced5460eae77af73f23a2720Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/1b7e5bdf2be22ae8c61bdca5a5f96ec2746e9639nvd
- git.kernel.org/stable/c/1ccd52b790a66b8b5f75c87eab8c3a37f941a2bfnvd
- git.kernel.org/stable/c/921d6844625527a92d1178262a633cc88a8e61bdnvd
- git.kernel.org/stable/c/af73f23a27206ffb3c477cac75b5fcf03410556envd
- git.kernel.org/stable/c/ccd3bc595bda67db5a347b9050c2df28f292d3fbnvd
- git.kernel.org/stable/c/ced5460eae772e847debbc0b65ef93aedab92d3fnvd
- git.kernel.org/stable/c/e466930717ef18c112585a39fc6174d8eb441df5nvd
- git.kernel.org/stable/c/f35bd94b4e11c41de90cd0fa72c9062e8196822fnvd
News mentions
0No linked articles in our index yet.