In the Linux kernel, the following vulnerability has been resolved:
scsi: wd33c93: Don't use stale scsi_pointer value
A regression was introduced with commit dbb2da557a6a ("scsi: wd33c93: Move the SCSI pointer to private command data") which results in an oops in wd33c93intr(). That commit added the scsipointer variable and initialized it from hostdata->connected. However, during selection, hostdata->connected is not yet valid. Fix this by getting the current scsi_pointer from hostdata->selecting.
[
{
"signature_type": "Function",
"digest": {
"length": 14163.0,
"function_hash": "37740549433496377998132309420026204517"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e04642a207f1d2ae28a08624c04c67f5681f3451",
"target": {
"function": "wd33c93_intr",
"file": "drivers/scsi/wd33c93.c"
},
"id": "CVE-2024-50026-0ed3857d",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"329785145766253707819744393018248127295",
"286088354674054369402656759561332327427",
"69032768074868632548928622609802164003",
"190388887042156680522075035133602562096"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b60ff1a95c7c386cdd6153de3d7d85edaeabd800",
"target": {
"file": "drivers/scsi/wd33c93.c"
},
"id": "CVE-2024-50026-16fe6338",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Function",
"digest": {
"length": 14163.0,
"function_hash": "37740549433496377998132309420026204517"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b60ff1a95c7c386cdd6153de3d7d85edaeabd800",
"target": {
"function": "wd33c93_intr",
"file": "drivers/scsi/wd33c93.c"
},
"id": "CVE-2024-50026-4d5656db",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"329785145766253707819744393018248127295",
"286088354674054369402656759561332327427",
"69032768074868632548928622609802164003",
"190388887042156680522075035133602562096"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e04642a207f1d2ae28a08624c04c67f5681f3451",
"target": {
"file": "drivers/scsi/wd33c93.c"
},
"id": "CVE-2024-50026-8e5766dc",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Function",
"digest": {
"length": 14163.0,
"function_hash": "37740549433496377998132309420026204517"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3afeceda855dea9b85cddd96307d4d17c8742005",
"target": {
"function": "wd33c93_intr",
"file": "drivers/scsi/wd33c93.c"
},
"id": "CVE-2024-50026-b6c1a81c",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"329785145766253707819744393018248127295",
"286088354674054369402656759561332327427",
"69032768074868632548928622609802164003",
"190388887042156680522075035133602562096"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9023ed8d91eb1fcc93e64dc4962f7412b1c4cbec",
"target": {
"file": "drivers/scsi/wd33c93.c"
},
"id": "CVE-2024-50026-c4490bc5",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"329785145766253707819744393018248127295",
"286088354674054369402656759561332327427",
"69032768074868632548928622609802164003",
"190388887042156680522075035133602562096"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3afeceda855dea9b85cddd96307d4d17c8742005",
"target": {
"file": "drivers/scsi/wd33c93.c"
},
"id": "CVE-2024-50026-d85a5920",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Function",
"digest": {
"length": 14163.0,
"function_hash": "37740549433496377998132309420026204517"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9023ed8d91eb1fcc93e64dc4962f7412b1c4cbec",
"target": {
"function": "wd33c93_intr",
"file": "drivers/scsi/wd33c93.c"
},
"id": "CVE-2024-50026-efe6f0fd",
"signature_version": "v1",
"deprecated": false
}
]