Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2022-50030
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-18 Jun, 2025 | 11:01
Updated At-23 Dec, 2025 | 13:26
Rejected At-
▼CVE Numbering Authority (CNA)
scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input Malformed user input to debugfs results in buffer overflow crashes. Adapt input string lengths to fit within internal buffers, leaving space for NULL terminators.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/scsi/lpfc/lpfc_debugfs.c
Default Status
unaffected
Versions
Affected
  • From bd2cdd5e400f5914bc30d5cfb0a0185cf51e4424 before 927907f1cbb3408cadde637fccfc17bb6b10a87d (git)
  • From bd2cdd5e400f5914bc30d5cfb0a0185cf51e4424 before c29a4baaad38a332c0ae480cf6d6c5bf75ac1828 (git)
  • From bd2cdd5e400f5914bc30d5cfb0a0185cf51e4424 before b92506dc51f81741eb26609175ac206c20f06e0a (git)
  • From bd2cdd5e400f5914bc30d5cfb0a0185cf51e4424 before 2d544e9d19c109dfe34b3dc1253a8b2971abe060 (git)
  • From bd2cdd5e400f5914bc30d5cfb0a0185cf51e4424 before f8191d40aa612981ce897e66cda6a88db8df17bb (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/scsi/lpfc/lpfc_debugfs.c
Default Status
affected
Versions
Affected
  • 4.11
Unaffected
  • From 0 before 4.11 (semver)
  • From 5.4.211 through 5.4.* (semver)
  • From 5.10.138 through 5.10.* (semver)
  • From 5.15.63 through 5.15.* (semver)
  • From 5.19.4 through 5.19.* (semver)
  • From 6.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/927907f1cbb3408cadde637fccfc17bb6b10a87d
N/A
https://git.kernel.org/stable/c/c29a4baaad38a332c0ae480cf6d6c5bf75ac1828
N/A
https://git.kernel.org/stable/c/b92506dc51f81741eb26609175ac206c20f06e0a
N/A
https://git.kernel.org/stable/c/2d544e9d19c109dfe34b3dc1253a8b2971abe060
N/A
https://git.kernel.org/stable/c/f8191d40aa612981ce897e66cda6a88db8df17bb
N/A
Hyperlink: https://git.kernel.org/stable/c/927907f1cbb3408cadde637fccfc17bb6b10a87d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c29a4baaad38a332c0ae480cf6d6c5bf75ac1828
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b92506dc51f81741eb26609175ac206c20f06e0a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2d544e9d19c109dfe34b3dc1253a8b2971abe060
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f8191d40aa612981ce897e66cda6a88db8df17bb
Resource: N/A
Details not found