In the Linux kernel, the following vulnerability has been resolved:
scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs
The driver, through the SAS transport, exposes a sysfs interface to
enable/disable PHYs in a controller/expander setup. When multiple PHYs
are disabled and enabled in rapid succession, the persistent and current
config pages related to SAS IO unit/SAS Expander pages could get
corrupted.
Use separate memory for each config request.
Metrics
Affected Vendors & Products
References
History
Tue, 14 Jan 2025 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Sat, 11 Jan 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs The driver, through the SAS transport, exposes a sysfs interface to enable/disable PHYs in a controller/expander setup. When multiple PHYs are disabled and enabled in rapid succession, the persistent and current config pages related to SAS IO unit/SAS Expander pages could get corrupted. Use separate memory for each config request. | |
Title | scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs | |
References |
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2025-01-11T12:39:50.958Z
Updated: 2025-01-15T12:49:31.306Z
Reserved: 2025-01-09T09:50:31.793Z
Link: CVE-2024-57804
Vulnrichment
No data.
NVD
Status : Received
Published: 2025-01-11T13:15:30.233
Modified: 2025-01-11T13:15:30.233
Link: CVE-2024-57804
Redhat