CVE-2022-49332
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-49332 affects the Linux kernel and involves a NULL pointer dereference vulnerability in the SCSI lpfc driver. The vulnerability was discovered when it was found that calls to stargettorport() may return NULL, leading to potential system crashes. The issue affects Linux kernel versions from 5.18 through 5.18.4 (NVD).

Technical details

The vulnerability exists in the Linux kernel's SCSI lpfc driver where calls to stargettorport() could return NULL, and the code did not properly check for this NULL return value before dereferencing the pointer. This issue was identified in the deviceresethandler and targetresethandler functions within the lpfc driver. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (MEDIUM) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).

Impact

If exploited, this vulnerability could lead to a NULL pointer dereference, resulting in a system crash and denial of service condition. The impact is limited to availability, with no direct impact on confidentiality or integrity (NVD).

Mitigation and workarounds

The vulnerability has been fixed by adding NULL pointer checks before dereferencing the rport value returned by stargettorport(). The fix was implemented in two kernel commits that add explicit NULL checks before accessing rport->dd_data (Kernel Patch 1, Kernel Patch 2).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management