VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54014

CVE-2023-54014

Description

In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport()

Klocwork reported warning of rport maybe NULL and will be dereferenced. rport returned by call to fc_bsg_to_rport() could be NULL and dereferenced.

Check valid rport returned by fc_bsg_to_rport().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A null-pointer dereference in the Linux kernel's qla2xxx SCSI driver, where fc_bsg_to_rport() can return NULL and then dereference a NULL rport.

Vulnerability

CVE-2023-54014 is a null-pointer dereference vulnerability in the Linux kernel's qla2xxx SCSI driver. The issue was identified by Klocwork static analysis, which warned that the rport pointer returned by the fc_bsg_to_rport() function could be NULL and subsequently dereferenced without a proper check [1][2][3].

Exploitation

An attacker with the ability to trigger the vulnerable code path in the qla2xxx driver, likely through a crafted Fibre Channel (FC) request via the BSG (block SCSI generic) interface. No authentication is required beyond the ability to send such requests to the driver. The attack surface is limited to systems with the qla2xxx driver loaded and accessible to unprivileged users or remote attackers who can send FC frames.

Impact

If successfully exploited, this bug could cause a kernel crash (denial of service) due to dereferencing a NULL pointer. In some configurations, it might be leveraged for privilege escalation if the NULL pointer dereference occurs in a context where an attacker can control the memory layout. However, the primary impact is system instability and denial of service.

Mitigation

The fix is included in the Linux kernel stable updates. Patches are available in the kernel git repository [1][2][3]. Users should apply the latest kernel updates from their distribution to remediate this vulnerability.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.