Skip to main content

CVE-2022-49730: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49730cvecve-2022-49730
Published: Wed Feb 26 2025 (02/26/2025, 02:24:40 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted A use-after-free crash can occur after an ELS LOGO is aborted. Specifically, a nodelist structure is freed and then ndlp->vport->cfg_log_verbose is dereferenced in lpfc_nlp_get() when the discovery state machine is mistakenly called a second time with NLP_EVT_DEVICE_RM argument. Rework lpfc_cmpl_els_logo() to prevent the duplicate calls to release a nodelist structure.

AI-Powered Analysis

AILast updated: 07/03/2025, 02:26:16 UTC

Technical Analysis

CVE-2022-49730 is a high-severity vulnerability in the Linux kernel's SCSI subsystem, specifically within the lpfc (LightPulse Fibre Channel) driver. The issue arises from a use-after-free condition triggered when an ELS (Extended Link Service) LOGO command is aborted. In this scenario, a nodelist structure, which tracks Fibre Channel nodes, is prematurely freed. Subsequently, the kernel attempts to dereference a pointer (ndlp->vport->cfg_log_verbose) within the function lpfc_nlp_get(), due to the discovery state machine being erroneously invoked a second time with the NLP_EVT_DEVICE_RM event. This leads to a NULL pointer dereference and potential kernel crash. The root cause is duplicate calls to release the nodelist structure, which the patch addresses by reworking the lpfc_cmpl_els_logo() function to prevent these duplicate releases. The vulnerability is classified under CWE-416 (Use After Free) and has a CVSS v3.1 score of 7.8, indicating high severity. Exploitation requires local privileges (AV:L), low attack complexity (AC:L), and privileges (PR:L), but no user interaction (UI:N). The impact includes full compromise of confidentiality, integrity, and availability of affected systems. No known exploits are currently in the wild, but the vulnerability's nature makes it a critical concern for systems using the lpfc driver, commonly found in enterprise storage environments.

Potential Impact

For European organizations, especially those operating data centers, cloud infrastructure, or enterprise storage solutions relying on Linux servers with Fibre Channel connectivity, this vulnerability poses a significant risk. Successful exploitation can lead to kernel crashes causing denial of service, or potentially allow attackers with limited privileges to escalate their access or execute arbitrary code in kernel space. This compromises system confidentiality, integrity, and availability, potentially disrupting critical business operations, data storage, and processing. Given the widespread use of Linux in European public and private sectors, including financial institutions, telecommunications, and government infrastructure, the impact could be severe. Additionally, organizations with high-availability requirements or those managing sensitive data may face regulatory and compliance repercussions if affected by outages or breaches stemming from this vulnerability.

Mitigation Recommendations

European organizations should prioritize patching affected Linux kernel versions as soon as vendor updates become available, focusing on kernels incorporating the lpfc driver. Until patches are applied, organizations should limit access to systems with Fibre Channel connectivity to trusted administrators only, minimizing the risk of local privilege exploitation. Implement strict access controls and monitoring on systems running the lpfc driver to detect abnormal behavior or crashes related to the SCSI subsystem. Consider isolating critical storage networks to reduce exposure. Additionally, conduct thorough audits of kernel versions in use across infrastructure to identify vulnerable systems. Employ kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and enable security modules like SELinux or AppArmor to mitigate exploitation impact. Finally, maintain up-to-date incident response plans to quickly address potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:21:30.449Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982cc4522896dcbe49b0

Added to database: 5/21/2025, 9:09:00 AM

Last enriched: 7/3/2025, 2:26:16 AM

Last updated: 8/4/2025, 12:27:00 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats