๐Ÿ” CVE Alert

CVE-2022-50459

UNKNOWN 0.0

scsi: iscsi: iscsi_tcp: Fix null-ptr-deref while calling getpeername()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: scsi: iscsi: iscsi_tcp: Fix null-ptr-deref while calling getpeername() Fix a NULL pointer crash that occurs when we are freeing the socket at the same time we access it via sysfs. The problem is that: 1. iscsi_sw_tcp_conn_get_param() and iscsi_sw_tcp_host_get_param() take the frwd_lock and do sock_hold() then drop the frwd_lock. sock_hold() does a get on the "struct sock". 2. iscsi_sw_tcp_release_conn() does sockfd_put() which does the last put on the "struct socket" and that does __sock_release() which sets the sock->ops to NULL. 3. iscsi_sw_tcp_conn_get_param() and iscsi_sw_tcp_host_get_param() then call kernel_getpeername() which accesses the NULL sock->ops. Above we do a get on the "struct sock", but we needed a get on the "struct socket". Originally, we just held the frwd_lock the entire time but in commit bcf3a2953d36 ("scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername()") we switched to refcount based because the network layer changed and started taking a mutex in that path, so we could no longer hold the frwd_lock. Instead of trying to maintain multiple refcounts, this just has us use a mutex for accessing the socket in the interface code paths.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
bcf3a2953d36bbfb9bd44ccb3db0897d935cc485 < 884a788f065578bb640382279a83d1df433b13e6 bcf3a2953d36bbfb9bd44ccb3db0897d935cc485 < a26b0658751bb0a3b28386fca715333b104d32a2 bcf3a2953d36bbfb9bd44ccb3db0897d935cc485 < 897dbbc57d71e8a34ec1af8e573a142de457da38 bcf3a2953d36bbfb9bd44ccb3db0897d935cc485 < 0a0b861fce2657ba08ec356a74346b37ca4b2008 bcf3a2953d36bbfb9bd44ccb3db0897d935cc485 < 57569c37f0add1b6489e1a1563c71519daf732cf 7d29e950766327f658cb92722b9445ac3b3ae023
Linux / Linux
5.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/884a788f065578bb640382279a83d1df433b13e6 git.kernel.org: https://git.kernel.org/stable/c/a26b0658751bb0a3b28386fca715333b104d32a2 git.kernel.org: https://git.kernel.org/stable/c/897dbbc57d71e8a34ec1af8e573a142de457da38 git.kernel.org: https://git.kernel.org/stable/c/0a0b861fce2657ba08ec356a74346b37ca4b2008 git.kernel.org: https://git.kernel.org/stable/c/57569c37f0add1b6489e1a1563c71519daf732cf