CVE-2024-50026
scsi: wd33c93: Don't use stale scsi_pointer value
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: scsi: wd33c93: Don't use stale scsi_pointer value A regression was introduced with commit dbb2da557a6a ("scsi: wd33c93: Move the SCSI pointer to private command data") which results in an oops in wd33c93_intr(). That commit added the scsi_pointer variable and initialized it from hostdata->connected. However, during selection, hostdata->connected is not yet valid. Fix this by getting the current scsi_pointer from hostdata->selecting.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Oct 21, 2024 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
dbb2da557a6a87c88bbb4b1fef037091b57f701b < 3afeceda855dea9b85cddd96307d4d17c8742005 dbb2da557a6a87c88bbb4b1fef037091b57f701b < e04642a207f1d2ae28a08624c04c67f5681f3451 dbb2da557a6a87c88bbb4b1fef037091b57f701b < b60ff1a95c7c386cdd6153de3d7d85edaeabd800 dbb2da557a6a87c88bbb4b1fef037091b57f701b < 9023ed8d91eb1fcc93e64dc4962f7412b1c4cbec
Linux / Linux
5.18
References
git.kernel.org: https://git.kernel.org/stable/c/3afeceda855dea9b85cddd96307d4d17c8742005 git.kernel.org: https://git.kernel.org/stable/c/e04642a207f1d2ae28a08624c04c67f5681f3451 git.kernel.org: https://git.kernel.org/stable/c/b60ff1a95c7c386cdd6153de3d7d85edaeabd800 git.kernel.org: https://git.kernel.org/stable/c/9023ed8d91eb1fcc93e64dc4962f7412b1c4cbec lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html