In the Linux kernel, the following vulnerability has been resolved:
scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID
An error case exit from lpfccmplctcmdgftid() results in a call to lpfcnlp_put() with a null pointer to a nodelist structure.
Changed lpfccmplctcmdgft_id() to initialize nodelist pointer upon entry.
[
{
"id": "CVE-2022-50467-85d8a3e1",
"signature_type": "Function",
"digest": {
"length": 2244.0,
"function_hash": "301187542011544438540586941074734674465"
},
"target": {
"file": "drivers/scsi/lpfc/lpfc_ct.c",
"function": "lpfc_cmpl_ct_cmd_gft_id"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@82dc1fe4324e2c897f2ed1c66f4fcff03094ac3a"
},
{
"id": "CVE-2022-50467-8efe42e4",
"signature_type": "Function",
"digest": {
"length": 2244.0,
"function_hash": "301187542011544438540586941074734674465"
},
"target": {
"file": "drivers/scsi/lpfc/lpfc_ct.c",
"function": "lpfc_cmpl_ct_cmd_gft_id"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@59b7e210a522b836a01516c71ee85d1d92c1f075"
},
{
"id": "CVE-2022-50467-91eb1e98",
"signature_type": "Line",
"digest": {
"line_hashes": [
"6531733006967095000470804017009863406",
"217972834226973987877460366237756437251",
"75529614248915342747694631002382404087",
"71605749350663397534804914962458964997",
"12854484687243720648313005900713784666",
"239788123896621584257038034423083330558",
"41715794393996923484193040790234986018",
"178336420434065213535440760634075843139",
"179826551938824595518551938427269421709",
"46400063345848297296787609040252270614",
"327222380334148728306281379945600110322",
"330612360877080103904446104283106542204",
"83419892940818660336220147313298875082"
],
"threshold": 0.9
},
"target": {
"file": "drivers/scsi/lpfc/lpfc_ct.c"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@82dc1fe4324e2c897f2ed1c66f4fcff03094ac3a"
},
{
"id": "CVE-2022-50467-95d29522",
"signature_type": "Line",
"digest": {
"line_hashes": [
"6531733006967095000470804017009863406",
"217972834226973987877460366237756437251",
"75529614248915342747694631002382404087",
"71605749350663397534804914962458964997",
"12854484687243720648313005900713784666",
"239788123896621584257038034423083330558",
"41715794393996923484193040790234986018",
"178336420434065213535440760634075843139",
"179826551938824595518551938427269421709",
"46400063345848297296787609040252270614",
"327222380334148728306281379945600110322",
"330612360877080103904446104283106542204",
"83419892940818660336220147313298875082"
],
"threshold": 0.9
},
"target": {
"file": "drivers/scsi/lpfc/lpfc_ct.c"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@04e7cd8c85636a329d1a6e5a269a7c8b6f71c41c"
},
{
"id": "CVE-2022-50467-9e1eb2be",
"signature_type": "Line",
"digest": {
"line_hashes": [
"6531733006967095000470804017009863406",
"217972834226973987877460366237756437251",
"75529614248915342747694631002382404087",
"71605749350663397534804914962458964997",
"12854484687243720648313005900713784666",
"239788123896621584257038034423083330558",
"41715794393996923484193040790234986018",
"178336420434065213535440760634075843139",
"179826551938824595518551938427269421709",
"46400063345848297296787609040252270614",
"327222380334148728306281379945600110322",
"330612360877080103904446104283106542204",
"83419892940818660336220147313298875082"
],
"threshold": 0.9
},
"target": {
"file": "drivers/scsi/lpfc/lpfc_ct.c"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@59b7e210a522b836a01516c71ee85d1d92c1f075"
},
{
"id": "CVE-2022-50467-cf42855f",
"signature_type": "Function",
"digest": {
"length": 2244.0,
"function_hash": "301187542011544438540586941074734674465"
},
"target": {
"file": "drivers/scsi/lpfc/lpfc_ct.c",
"function": "lpfc_cmpl_ct_cmd_gft_id"
},
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@04e7cd8c85636a329d1a6e5a269a7c8b6f71c41c"
}
]