First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: scsi: sd: Fix potential NULL pointer dereference If sd_probe() sees an early error before sdkp->device is initialized, sd_zbc_release_disk() is called. This causes a NULL pointer dereference when sd_is_zoned() is called inside that function. Avoid this by removing the call to sd_zbc_release_disk() in sd_probe() error path. This change is safe and does not result in zone information memory leakage because the zone information for a zoned disk is allocated only when sd_revalidate_disk() is called, at which point sdkp->disk_dev is fully set, resulting in sd_disk_release() being called when needed to cleanup a disk zone information using sd_zbc_release_disk().
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=4.10<5.10.122 | |
Linux Kernel | >=5.11<5.15.47 | |
Linux Kernel | >=5.16<5.17.15 | |
Linux Kernel | >=5.18<5.18.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49376 has been classified as a medium severity vulnerability in the Linux kernel.
To fix CVE-2022-49376, update the Linux kernel to a version that includes the patch addressing this vulnerability.
CVE-2022-49376 affects Linux kernel versions between 4.10 and 5.10.122, 5.11 to 5.15.47, 5.16 to 5.17.15, and 5.18 to 5.18.4.
The impact of CVE-2022-49376 is a potential NULL pointer dereference, which could lead to a system crash or instability.
CVE-2022-49376 was resolved with patches released in the Linux kernel updates following the identification of the vulnerability.