Home

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID An error case exit from lpfc_cmpl_ct_cmd_gft_id() results in a call to lpfc_nlp_put() with a null pointer to a nodelist structure. Changed lpfc_cmpl_ct_cmd_gft_id() to initialize nodelist pointer upon entry.

PUBLISHED Reserved 2025-10-01 | Published 2025-10-01 | Updated 2025-10-01 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 04e7cd8c85636a329d1a6e5a269a7c8b6f71c41c
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 82dc1fe4324e2c897f2ed1c66f4fcff03094ac3a
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 59b7e210a522b836a01516c71ee85d1d92c1f075
affected

Default status
affected

5.19.17
unaffected

6.0.3
unaffected

6.1
unaffected

References

git.kernel.org/...c/04e7cd8c85636a329d1a6e5a269a7c8b6f71c41c

git.kernel.org/...c/82dc1fe4324e2c897f2ed1c66f4fcff03094ac3a

git.kernel.org/...c/59b7e210a522b836a01516c71ee85d1d92c1f075

cve.org (CVE-2022-50467)

nvd.nist.gov (CVE-2022-50467)

Download JSON