Skip to main content

CVE-2022-49536: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49536cvecve-2022-49536
Published: Wed Feb 26 2025 (02/26/2025, 02:13:54 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock During stress I/O tests with 500+ vports, hard LOCKUP call traces are observed. CPU A: native_queued_spin_lock_slowpath+0x192 _raw_spin_lock_irqsave+0x32 lpfc_handle_fcp_err+0x4c6 lpfc_fcp_io_cmd_wqe_cmpl+0x964 lpfc_sli4_fp_handle_cqe+0x266 __lpfc_sli4_process_cq+0x105 __lpfc_sli4_hba_process_cq+0x3c lpfc_cq_poll_hdler+0x16 irq_poll_softirq+0x76 __softirqentry_text_start+0xe4 irq_exit+0xf7 do_IRQ+0x7f CPU B: native_queued_spin_lock_slowpath+0x5b _raw_spin_lock+0x1c lpfc_abort_handler+0x13e scmd_eh_abort_handler+0x85 process_one_work+0x1a7 worker_thread+0x30 kthread+0x112 ret_from_fork+0x1f Diagram of lockup: CPUA CPUB ---- ---- lpfc_cmd->buf_lock phba->hbalock lpfc_cmd->buf_lock phba->hbalock Fix by reordering the taking of the lpfc_cmd->buf_lock and phba->hbalock in lpfc_abort_handler routine so that it tries to take the lpfc_cmd->buf_lock first before phba->hbalock.

AI-Powered Analysis

AILast updated: 06/29/2025, 22:10:01 UTC

Technical Analysis

CVE-2022-49536 is a vulnerability identified in the Linux kernel's SCSI subsystem, specifically within the lpfc (LightPulse Fibre Channel) driver. The issue arises from a deadlock condition during SCSI I/O completion and abort handling under heavy load scenarios, such as stress I/O tests involving over 500 virtual ports (vports). The deadlock is caused by an inconsistent lock acquisition order between two locks: lpfc_cmd->buf_lock and phba->hbalock. The kernel code paths on two CPUs attempt to acquire these locks in opposite orders, leading to a circular wait and a hard LOCKUP, effectively freezing the system. The vulnerability manifests as a kernel hang or system lockup during intensive SCSI operations, impacting system availability. The fix involves reordering the lock acquisition in the lpfc_abort_handler routine to always acquire lpfc_cmd->buf_lock before phba->hbalock, preventing the deadlock scenario. This vulnerability does not require user interaction or authentication to trigger but does require a specific high-load environment with many vports performing SCSI I/O operations. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The affected versions are specific Linux kernel commits identified by their hashes, indicating the issue is present in certain kernel builds prior to the fix. This vulnerability is primarily a denial-of-service (DoS) risk due to system lockup rather than a direct confidentiality or integrity compromise.

Potential Impact

For European organizations, especially those operating data centers, cloud infrastructure, or enterprise storage systems running Linux with Fibre Channel storage networks, this vulnerability poses a significant availability risk. Systems under heavy SCSI I/O load with many virtual ports could experience kernel lockups, leading to service outages or degraded performance. This can impact critical business applications relying on continuous storage access, such as databases, virtualization platforms, and large-scale file servers. The disruption could affect sectors like finance, telecommunications, healthcare, and manufacturing, where Linux-based storage solutions are common. Although no direct data breach or integrity compromise is indicated, prolonged downtime or repeated crashes could lead to operational losses and increased recovery costs. The absence of known exploits reduces immediate risk, but the complexity of the issue means that organizations using affected kernel versions should prioritize patching to maintain system stability and avoid unexpected outages.

Mitigation Recommendations

1. Apply the official Linux kernel patch that reorders the lock acquisition in the lpfc_abort_handler as soon as it becomes available from trusted Linux kernel maintainers or distribution vendors. 2. Identify and inventory all systems using the affected Linux kernel versions with the vulnerable lpfc driver, focusing on those with high SCSI I/O loads and multiple vports. 3. For critical systems where immediate patching is not feasible, consider reducing the number of virtual ports or limiting concurrent SCSI I/O operations to mitigate the risk of triggering the deadlock. 4. Monitor system logs and kernel messages for signs of lockups or hard LOCKUP call traces related to lpfc operations to detect early symptoms. 5. Implement robust backup and recovery procedures to minimize downtime impact in case of system lockups. 6. Coordinate with hardware vendors for firmware updates or configuration changes that might reduce stress on the SCSI subsystem. 7. Test patches in staging environments under simulated high-load conditions before deployment to production to ensure stability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.589Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe4387

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 10:10:01 PM

Last updated: 8/7/2025, 9:47:49 AM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats