CVE-2023-54289
Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: qedf: Fix NULL dereference in error handling
Smatch reported:
drivers/scsi/qedf/qedf_main.c:3056 qedf_alloc_global_queues() warn: missing unwind goto?
At this point in the function, nothing has been allocated so we can return directly. In particular the "qedf->global_queues" have not been allocated so calling qedf_free_global_queues() will lead to a NULL dereference when we check if (!gl[i]) and "gl" is NULL.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A NULL pointer dereference in the Linux kernel's qedf driver occurs if error handling calls qedf_free_global_queues before allocation.
Root
Cause
The vulnerability exists in the qedf_alloc_global_queues() function within the QLogic Fibre Channel (qedf) driver of the Linux kernel. A static analysis (Smatch) warning revealed that the function's error path is missing an early return when no allocations have occurred yet [1] [2] [3]. At the point where the error path incorrectly invokes cleanup, the qedf->global_queues pointer has not been allocated, and the local gl pointer is still NULL, leading to a NULL pointer dereference when the code attempts to iterate over gl[i] inside qedf_free_global_queues().
Exploitation
Context
This is a local bug triggered during driver initialization failure. No special privileges or network access are required beyond the ability to cause the driver to load and then fail memory allocation early in the probe sequence. The attacker would need to influence system conditions (e.g., by exhausting memory) to induce the allocation failure at the specific point before global_queues is set.
Impact
If triggered, the NULL dereference results in a kernel crash (oops) or system denial of service. An attacker able to force the vulnerable code path can cause the system to become unavailable. No privilege escalation or data leak is associated with this bug.
Mitigation
The fix was applied in the Linux kernel stable trees [1] [2] [3] and consists of adding a direct return from the error path when no memory has been allocated yet, thus preventing the unsafe call to qedf_free_global_queues(). All downstream stable kernels that include the vulnerable commit should be updated.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
7961c8370c5f7ac64019e4d4bb1de5105d29bc316bde418af08c001c1e944271c9b2eb601f025312b0894Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- git.kernel.org/stable/c/08c001c1e9444a3046c79a99aa93ac48073b18ccnvd
- git.kernel.org/stable/c/271c9b2eb60149afbeab28cb39e52f73bde9900cnvd
- git.kernel.org/stable/c/961c8370c5f7e80a267680476e1bcff34bffe71anvd
- git.kernel.org/stable/c/ac64019e4d4b08c23edb117e0b2590985e33de1dnvd
- git.kernel.org/stable/c/b1de5105d29b145b727b797e2d5de071ab3a7ca1nvd
- git.kernel.org/stable/c/c316bde418af4c2a9df51149ed01d1bd8ca5bebfnvd
- git.kernel.org/stable/c/f025312b089474a54e4859f3453771314d9e3d4fnvd
News mentions
0No linked articles in our index yet.