CVE-2022-50030

Source
https://cve.org/CVERecord?id=CVE-2022-50030
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50030.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50030
Downstream
Related
Published
2025-06-18T11:01:33.345Z
Modified
2026-03-20T12:24:50.962932Z
Summary
scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input

Malformed user input to debugfs results in buffer overflow crashes. Adapt input string lengths to fit within internal buffers, leaving space for NULL terminators.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50030.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bd2cdd5e400f5914bc30d5cfb0a0185cf51e4424
Fixed
927907f1cbb3408cadde637fccfc17bb6b10a87d
Fixed
c29a4baaad38a332c0ae480cf6d6c5bf75ac1828
Fixed
b92506dc51f81741eb26609175ac206c20f06e0a
Fixed
2d544e9d19c109dfe34b3dc1253a8b2971abe060
Fixed
f8191d40aa612981ce897e66cda6a88db8df17bb

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50030.json"