Bug 2347710 (CVE-2022-49504) - CVE-2022-49504 kernel: scsi: lpfc: Inhibit aborts if external loopback plug is inserted
Summary: CVE-2022-49504 kernel: scsi: lpfc: Inhibit aborts if external loopback plug i...
Keywords:
Status: NEW
Alias: CVE-2022-49504
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-02-26 03:04 UTC by OSIDB Bzimport
Modified: 2025-05-05 14:59 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-02-26 03:04:01 UTC
In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Inhibit aborts if external loopback plug is inserted

After running a short external loopback test, when the external loopback is
removed and a normal cable inserted that is directly connected to a target
device, the system oops in the llpfc_set_rrq_active() routine.

When the loopback was inserted an FLOGI was transmit. As we're looped back,
we receive the FLOGI request. The FLOGI is ABTS'd as we recognize the same
wppn thus understand it's a loopback. However, as the ABTS sends address
information the port is not set to (fffffe), the ABTS is dropped on the
wire. A short 1 frame loopback test is run and completes before the ABTS
times out. The looback is unplugged and the new cable plugged in, and the
an FLOGI to the new device occurs and completes. Due to a mixup in ref
counting the completion of the new FLOGI releases the fabric ndlp. Then the
original ABTS completes and references the released ndlp generating the
oops.

Correct by no-op'ing the ABTS when in loopback mode (it will be dropped
anyway). Added a flag to track the mode to recognize when it should be
no-op'd.

Comment 1 Avinash Hanwate 2025-02-26 13:22:36 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2022-49504-9b25@gregkh/T

Comment 4 Avinash Hanwate 2025-02-26 17:25:02 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2022-49504-9b25@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.