CVE-2022-49542: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg() In an attempt to log message 0126 with LOG_TRACE_EVENT, the following hard lockup call trace hangs the system. Call Trace: _raw_spin_lock_irqsave+0x32/0x40 lpfc_dmp_dbg.part.32+0x28/0x220 [lpfc] lpfc_cmpl_els_fdisc+0x145/0x460 [lpfc] lpfc_sli_cancel_jobs+0x92/0xd0 [lpfc] lpfc_els_flush_cmd+0x43c/0x670 [lpfc] lpfc_els_flush_all_cmd+0x37/0x60 [lpfc] lpfc_sli4_async_event_proc+0x956/0x1720 [lpfc] lpfc_do_work+0x1485/0x1d70 [lpfc] kthread+0x112/0x130 ret_from_fork+0x1f/0x40 Kernel panic - not syncing: Hard LOCKUP The same CPU tries to claim the phba->port_list_lock twice. Move the cfg_log_verbose checks as part of the lpfc_printf_vlog() and lpfc_printf_log() macros before calling lpfc_dmp_dbg(). There is no need to take the phba->port_list_lock within lpfc_dmp_dbg().
AI Analysis
Technical Summary
CVE-2022-49542 is a vulnerability identified in the Linux kernel, specifically within the lpfc driver, which manages Emulex LightPulse Fibre Channel Host Bus Adapters (HBAs). The issue arises from improper locking behavior during verbose logging operations. The vulnerability manifests when the kernel attempts to log a specific message (message 0126) using the LOG_TRACE_EVENT mechanism. During this process, the code path leads to a hard lockup due to the same CPU attempting to acquire the phba->port_list_lock spinlock twice without releasing it, causing a deadlock. This results in a kernel panic with a hard LOCKUP error, effectively hanging the system. The root cause is that the cfg_log_verbose check was performed after entering the lpfc_dmp_dbg() function, which unnecessarily took the port_list_lock. The fix involves moving the cfg_log_verbose checks into the lpfc_printf_vlog() and lpfc_printf_log() macros before calling lpfc_dmp_dbg(), thereby avoiding the need to acquire the port_list_lock within lpfc_dmp_dbg(). This change prevents the double-lock scenario and the consequent system hang. The vulnerability affects Linux kernel versions containing the specified commit hash (1da177e4c3f41524e886b7f1b8a0c1fc7321cac2), indicating a specific code state rather than a broad version range. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected lpfc driver version, especially those utilizing Emulex LightPulse Fibre Channel HBAs for storage networking. The impact is a potential denial of service (DoS) condition due to kernel panic and system hang, which can disrupt critical services relying on these systems. Organizations in sectors with high dependency on storage area networks (SANs), such as finance, healthcare, telecommunications, and cloud service providers, may face operational interruptions. The inability to log certain events without triggering a system hang could also hinder troubleshooting and monitoring efforts. While the vulnerability does not appear to allow privilege escalation or remote code execution, the resultant system unavailability can lead to significant business impact, including downtime, loss of productivity, and potential data access delays. Given the lack of known exploits, the immediate threat level is moderate; however, the vulnerability's presence in kernel-level code means that exploitation could be severe if triggered, especially in environments with high availability requirements.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched, ensuring the lpfc driver includes the fix that moves the cfg_log_verbose checks before calling lpfc_dmp_dbg(). System administrators should audit their environments to identify systems using Emulex LightPulse Fibre Channel HBAs and verify kernel versions against the affected commit. In environments where immediate patching is not feasible, temporarily disabling verbose logging for the lpfc driver or limiting the use of LOG_TRACE_EVENT for message 0126 may reduce the risk of triggering the vulnerability. Additionally, implementing robust monitoring to detect early signs of kernel lockups or panics can facilitate rapid response. Organizations should also review their incident response and recovery procedures to minimize downtime in case of exploitation. Coordination with hardware vendors for firmware updates or driver patches may provide additional mitigation layers. Finally, maintaining strict access controls and limiting administrative privileges can reduce the risk of accidental or malicious triggering of the vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2022-49542: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg() In an attempt to log message 0126 with LOG_TRACE_EVENT, the following hard lockup call trace hangs the system. Call Trace: _raw_spin_lock_irqsave+0x32/0x40 lpfc_dmp_dbg.part.32+0x28/0x220 [lpfc] lpfc_cmpl_els_fdisc+0x145/0x460 [lpfc] lpfc_sli_cancel_jobs+0x92/0xd0 [lpfc] lpfc_els_flush_cmd+0x43c/0x670 [lpfc] lpfc_els_flush_all_cmd+0x37/0x60 [lpfc] lpfc_sli4_async_event_proc+0x956/0x1720 [lpfc] lpfc_do_work+0x1485/0x1d70 [lpfc] kthread+0x112/0x130 ret_from_fork+0x1f/0x40 Kernel panic - not syncing: Hard LOCKUP The same CPU tries to claim the phba->port_list_lock twice. Move the cfg_log_verbose checks as part of the lpfc_printf_vlog() and lpfc_printf_log() macros before calling lpfc_dmp_dbg(). There is no need to take the phba->port_list_lock within lpfc_dmp_dbg().
AI-Powered Analysis
Technical Analysis
CVE-2022-49542 is a vulnerability identified in the Linux kernel, specifically within the lpfc driver, which manages Emulex LightPulse Fibre Channel Host Bus Adapters (HBAs). The issue arises from improper locking behavior during verbose logging operations. The vulnerability manifests when the kernel attempts to log a specific message (message 0126) using the LOG_TRACE_EVENT mechanism. During this process, the code path leads to a hard lockup due to the same CPU attempting to acquire the phba->port_list_lock spinlock twice without releasing it, causing a deadlock. This results in a kernel panic with a hard LOCKUP error, effectively hanging the system. The root cause is that the cfg_log_verbose check was performed after entering the lpfc_dmp_dbg() function, which unnecessarily took the port_list_lock. The fix involves moving the cfg_log_verbose checks into the lpfc_printf_vlog() and lpfc_printf_log() macros before calling lpfc_dmp_dbg(), thereby avoiding the need to acquire the port_list_lock within lpfc_dmp_dbg(). This change prevents the double-lock scenario and the consequent system hang. The vulnerability affects Linux kernel versions containing the specified commit hash (1da177e4c3f41524e886b7f1b8a0c1fc7321cac2), indicating a specific code state rather than a broad version range. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected lpfc driver version, especially those utilizing Emulex LightPulse Fibre Channel HBAs for storage networking. The impact is a potential denial of service (DoS) condition due to kernel panic and system hang, which can disrupt critical services relying on these systems. Organizations in sectors with high dependency on storage area networks (SANs), such as finance, healthcare, telecommunications, and cloud service providers, may face operational interruptions. The inability to log certain events without triggering a system hang could also hinder troubleshooting and monitoring efforts. While the vulnerability does not appear to allow privilege escalation or remote code execution, the resultant system unavailability can lead to significant business impact, including downtime, loss of productivity, and potential data access delays. Given the lack of known exploits, the immediate threat level is moderate; however, the vulnerability's presence in kernel-level code means that exploitation could be severe if triggered, especially in environments with high availability requirements.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched, ensuring the lpfc driver includes the fix that moves the cfg_log_verbose checks before calling lpfc_dmp_dbg(). System administrators should audit their environments to identify systems using Emulex LightPulse Fibre Channel HBAs and verify kernel versions against the affected commit. In environments where immediate patching is not feasible, temporarily disabling verbose logging for the lpfc driver or limiting the use of LOG_TRACE_EVENT for message 0126 may reduce the risk of triggering the vulnerability. Additionally, implementing robust monitoring to detect early signs of kernel lockups or panics can facilitate rapid response. Organizations should also review their incident response and recovery procedures to minimize downtime in case of exploitation. Coordination with hardware vendors for firmware updates or driver patches may provide additional mitigation layers. Finally, maintaining strict access controls and limiting administrative privileges can reduce the risk of accidental or malicious triggering of the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.589Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982bc4522896dcbe43c5
Added to database: 5/21/2025, 9:08:59 AM
Last enriched: 6/29/2025, 10:11:01 PM
Last updated: 8/13/2025, 10:18:41 PM
Views: 18
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.