CVE-2022-49332

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49332
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49332.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49332
Downstream
Related
Published
2025-02-26T02:10:51Z
Modified
2025-10-21T09:39:12.212084Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
scsi: lpfc: Address NULL pointer dereference after starget_to_rport()
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Address NULL pointer dereference after stargettorport()

Calls to stargettorport() may return NULL. Add check for NULL rport before dereference.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bb21fc9911eea92afd476f7e64b327716e042a25
Fixed
68fcff1127e4995ddbd4b6861892a25c23db3f70
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bb21fc9911eea92afd476f7e64b327716e042a25
Fixed
6f808bd78e8296b4ded813b7182988d57e1f6176

Affected versions

v5.*

v5.17
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.18.1
v5.18.2
v5.18.3
v5.19-rc1

Database specific

vanir_signatures

[
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6f808bd78e8296b4ded813b7182988d57e1f6176",
        "target": {
            "function": "lpfc_device_reset_handler",
            "file": "drivers/scsi/lpfc/lpfc_scsi.c"
        },
        "deprecated": false,
        "signature_version": "v1",
        "id": "CVE-2022-49332-1864eeb0",
        "digest": {
            "length": 1429.0,
            "function_hash": "109422218282411479208593293881894250028"
        },
        "signature_type": "Function"
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6f808bd78e8296b4ded813b7182988d57e1f6176",
        "target": {
            "file": "drivers/scsi/lpfc/lpfc_scsi.c"
        },
        "deprecated": false,
        "signature_version": "v1",
        "id": "CVE-2022-49332-79057a64",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "321390273885141190308371123065472501333",
                "248473755653104796433381440473135773324",
                "303828467963775240079778133206140194657",
                "36225036383564171710749510627664062523",
                "59485702015632973277692063300483817424",
                "19729892117428767298253095954364657765"
            ]
        },
        "signature_type": "Line"
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6f808bd78e8296b4ded813b7182988d57e1f6176",
        "target": {
            "function": "lpfc_target_reset_handler",
            "file": "drivers/scsi/lpfc/lpfc_scsi.c"
        },
        "deprecated": false,
        "signature_version": "v1",
        "id": "CVE-2022-49332-8a265f5e",
        "digest": {
            "length": 2599.0,
            "function_hash": "243239302809335700166439796176001832009"
        },
        "signature_type": "Function"
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@68fcff1127e4995ddbd4b6861892a25c23db3f70",
        "target": {
            "function": "lpfc_device_reset_handler",
            "file": "drivers/scsi/lpfc/lpfc_scsi.c"
        },
        "deprecated": false,
        "signature_version": "v1",
        "id": "CVE-2022-49332-d795077d",
        "digest": {
            "length": 1429.0,
            "function_hash": "109422218282411479208593293881894250028"
        },
        "signature_type": "Function"
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@68fcff1127e4995ddbd4b6861892a25c23db3f70",
        "target": {
            "file": "drivers/scsi/lpfc/lpfc_scsi.c"
        },
        "deprecated": false,
        "signature_version": "v1",
        "id": "CVE-2022-49332-e04fdd48",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "321390273885141190308371123065472501333",
                "248473755653104796433381440473135773324",
                "303828467963775240079778133206140194657",
                "36225036383564171710749510627664062523",
                "59485702015632973277692063300483817424",
                "19729892117428767298253095954364657765"
            ]
        },
        "signature_type": "Line"
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@68fcff1127e4995ddbd4b6861892a25c23db3f70",
        "target": {
            "function": "lpfc_target_reset_handler",
            "file": "drivers/scsi/lpfc/lpfc_scsi.c"
        },
        "deprecated": false,
        "signature_version": "v1",
        "id": "CVE-2022-49332-f538be69",
        "digest": {
            "length": 2599.0,
            "function_hash": "243239302809335700166439796176001832009"
        },
        "signature_type": "Function"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
5.18.4