CVE-2022-50030

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input Malformed user input to debugfs results in buffer overflow crashes. Adapt input string lengths to fit within internal buffers, leaving space for NULL terminators.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Nov 2025, 19:31

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/2d544e9d19c109dfe34b3dc1253a8b2971abe060 - () https://git.kernel.org/stable/c/2d544e9d19c109dfe34b3dc1253a8b2971abe060 - Patch
References () https://git.kernel.org/stable/c/927907f1cbb3408cadde637fccfc17bb6b10a87d - () https://git.kernel.org/stable/c/927907f1cbb3408cadde637fccfc17bb6b10a87d - Patch
References () https://git.kernel.org/stable/c/b92506dc51f81741eb26609175ac206c20f06e0a - () https://git.kernel.org/stable/c/b92506dc51f81741eb26609175ac206c20f06e0a - Patch
References () https://git.kernel.org/stable/c/c29a4baaad38a332c0ae480cf6d6c5bf75ac1828 - () https://git.kernel.org/stable/c/c29a4baaad38a332c0ae480cf6d6c5bf75ac1828 - Patch
References () https://git.kernel.org/stable/c/f8191d40aa612981ce897e66cda6a88db8df17bb - () https://git.kernel.org/stable/c/f8191d40aa612981ce897e66cda6a88db8df17bb - Patch
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-787

Information

Published : 2025-06-18 11:15

Updated : 2025-11-13 19:31


NVD link : CVE-2022-50030

Mitre link : CVE-2022-50030

CVE.ORG link : CVE-2022-50030


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write