First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg() In an attempt to log message 0126 with LOG_TRACE_EVENT, the following hard lockup call trace hangs the system. Call Trace: _raw_spin_lock_irqsave+0x32/0x40 lpfc_dmp_dbg.part.32+0x28/0x220 [lpfc] lpfc_cmpl_els_fdisc+0x145/0x460 [lpfc] lpfc_sli_cancel_jobs+0x92/0xd0 [lpfc] lpfc_els_flush_cmd+0x43c/0x670 [lpfc] lpfc_els_flush_all_cmd+0x37/0x60 [lpfc] lpfc_sli4_async_event_proc+0x956/0x1720 [lpfc] lpfc_do_work+0x1485/0x1d70 [lpfc] kthread+0x112/0x130 ret_from_fork+0x1f/0x40 Kernel panic - not syncing: Hard LOCKUP The same CPU tries to claim the phba->port_list_lock twice. Move the cfg_log_verbose checks as part of the lpfc_printf_vlog() and lpfc_printf_log() macros before calling lpfc_dmp_dbg(). There is no need to take the phba->port_list_lock within lpfc_dmp_dbg().
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <5.15.46 | |
Linux Kernel | >=5.16<5.17.14 | |
Linux Kernel | >=5.18<5.18.3 | |
Linux Kernel | ||
Broadcom LPFC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49542 has a medium severity level due to its potential to cause system hangs.
To fix CVE-2022-49542, update the Linux kernel and Broadcom lpfc driver to the latest version that includes the security patches.
CVE-2022-49542 affects the Linux Kernel and the Broadcom lpfc component.
CVE-2022-49542 is a hard lockup vulnerability that can hang the system when certain logging conditions are met.
Yes, CVE-2022-49542 has been resolved in recent updates of the affected software.