๐Ÿ” CVE Alert

CVE-2022-49376

MEDIUM 5.5

scsi: sd: Fix potential NULL pointer dereference

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: scsi: sd: Fix potential NULL pointer dereference If sd_probe() sees an early error before sdkp->device is initialized, sd_zbc_release_disk() is called. This causes a NULL pointer dereference when sd_is_zoned() is called inside that function. Avoid this by removing the call to sd_zbc_release_disk() in sd_probe() error path. This change is safe and does not result in zone information memory leakage because the zone information for a zoned disk is allocated only when sd_revalidate_disk() is called, at which point sdkp->disk_dev is fully set, resulting in sd_disk_release() being called when needed to cleanup a disk zone information using sd_zbc_release_disk().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 26, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
89d9475610771b5e5fe1879075f0fc9ba6e3755f < c1f0187025905e9981000d44a92e159468b561a8 89d9475610771b5e5fe1879075f0fc9ba6e3755f < 0fcb0b131cc90c8f523a293d84c58d0c7273c96f 89d9475610771b5e5fe1879075f0fc9ba6e3755f < 78f8e96df06e2d04d82d4071c299b59d28744f47 89d9475610771b5e5fe1879075f0fc9ba6e3755f < 3733439593ad12f7b54ae35c273ea6f15d692de3 89d9475610771b5e5fe1879075f0fc9ba6e3755f < 05fbde3a77a4f1d62e4c4428f384288c1f1a0be5
Linux / Linux
4.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c1f0187025905e9981000d44a92e159468b561a8 git.kernel.org: https://git.kernel.org/stable/c/0fcb0b131cc90c8f523a293d84c58d0c7273c96f git.kernel.org: https://git.kernel.org/stable/c/78f8e96df06e2d04d82d4071c299b59d28744f47 git.kernel.org: https://git.kernel.org/stable/c/3733439593ad12f7b54ae35c273ea6f15d692de3 git.kernel.org: https://git.kernel.org/stable/c/05fbde3a77a4f1d62e4c4428f384288c1f1a0be5