Home

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: fcoe: Fix transport not deattached when fcoe_if_init() fails fcoe_init() calls fcoe_transport_attach(&fcoe_sw_transport), but when fcoe_if_init() fails, &fcoe_sw_transport is not detached and leaves freed &fcoe_sw_transport on fcoe_transports list. This causes panic when reinserting module. BUG: unable to handle page fault for address: fffffbfff82e2213 RIP: 0010:fcoe_transport_attach+0xe1/0x230 [libfcoe] Call Trace: <TASK> do_one_initcall+0xd0/0x4e0 load_module+0x5eee/0x7210 ...

PUBLISHED Reserved 2025-09-17 | Published 2025-09-18 | Updated 2025-09-18 | Assigner Linux

Product status

Default status
unaffected

78a582463c1e3a262aeaf2a291e06a93a7b34212 (git) before d581303d6f8d4139513105d73dd65f26c6707160
affected

78a582463c1e3a262aeaf2a291e06a93a7b34212 (git) before b5cc59470df64f26ad397dbb71cbf130cf489edf
affected

78a582463c1e3a262aeaf2a291e06a93a7b34212 (git) before cf74d1197c0e3d2f353faa333e9e2847c73713f1
affected

78a582463c1e3a262aeaf2a291e06a93a7b34212 (git) before be5f1a82ad6056db22c86005dc4cac22a20deeef
affected

78a582463c1e3a262aeaf2a291e06a93a7b34212 (git) before 22e8c7a56bb1cd2ed0beaaccb34282ac9cbbe27e
affected

78a582463c1e3a262aeaf2a291e06a93a7b34212 (git) before 09a60f908d8b6497f618113b7c3c31267dc90911
affected

78a582463c1e3a262aeaf2a291e06a93a7b34212 (git) before 1dc499c615aa87dc46a3f2d1f91d2d358e55f3e3
affected

78a582463c1e3a262aeaf2a291e06a93a7b34212 (git) before aef82d16be5a353d913163f26fc4385e296be2b8
affected

78a582463c1e3a262aeaf2a291e06a93a7b34212 (git) before 4155658cee394b22b24c6d64e49247bf26d95b92
affected

Default status
affected

2.6.39
affected

Any version before 2.6.39
unaffected

4.9.337 (semver)
unaffected

4.14.303 (semver)
unaffected

4.19.270 (semver)
unaffected

5.4.229 (semver)
unaffected

5.10.163 (semver)
unaffected

5.15.86 (semver)
unaffected

6.0.16 (semver)
unaffected

6.1.2 (semver)
unaffected

6.2 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/d581303d6f8d4139513105d73dd65f26c6707160

git.kernel.org/...c/b5cc59470df64f26ad397dbb71cbf130cf489edf

git.kernel.org/...c/cf74d1197c0e3d2f353faa333e9e2847c73713f1

git.kernel.org/...c/be5f1a82ad6056db22c86005dc4cac22a20deeef

git.kernel.org/...c/22e8c7a56bb1cd2ed0beaaccb34282ac9cbbe27e

git.kernel.org/...c/09a60f908d8b6497f618113b7c3c31267dc90911

git.kernel.org/...c/1dc499c615aa87dc46a3f2d1f91d2d358e55f3e3

git.kernel.org/...c/aef82d16be5a353d913163f26fc4385e296be2b8

git.kernel.org/...c/4155658cee394b22b24c6d64e49247bf26d95b92

cve.org (CVE-2022-50414)

nvd.nist.gov (CVE-2022-50414)

Download JSON