CVE-2024-57804

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-57804
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-57804.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-57804
Downstream
Related
Published
2025-01-11T12:39:50.958Z
Modified
2025-11-28T02:34:10.590679Z
Summary
scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs

The driver, through the SAS transport, exposes a sysfs interface to enable/disable PHYs in a controller/expander setup. When multiple PHYs are disabled and enabled in rapid succession, the persistent and current config pages related to SAS IO unit/SAS Expander pages could get corrupted.

Use separate memory for each config request.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/57xxx/CVE-2024-57804.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
32d457d5a2af9bf5ddbe28297eabf1fc93451665
Fixed
869fdc6f0606060301aef648231e186c7c542f5a
Fixed
711201a8b8334a397440ac0b859df0054e174bc9

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.12.8