CVE-2022-49217

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49217
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49217.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49217
Related
Published
2025-02-26T07:00:58Z
Modified
2025-02-26T19:01:06.133684Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: pm8001: Fix abort all task initialization

In pm80xxsendabortall(), the nelem field of the ccb used is not initialized to 0. This missing initialization sometimes lead to the task completion path seeing the ccb with a non-zero nelem resulting in the execution of invalid dmaunmapsg() calls in pm8001ccbtaskfree(), causing a crash such as:

[ 197.676341] RIP: 0010:iommudmaunmapsg+0x6d/0x280 [ 197.700204] RSP: 0018:ffff889bbcf89c88 EFLAGS: 00010012 [ 197.705485] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff83d0bda0 [ 197.712687] RDX: 0000000000000002 RSI: 0000000000000000 RDI: ffff88810dffc0d0 [ 197.719887] RBP: 0000000000000000 R08: 0000000000000000 R09: ffff8881c790098b [ 197.727089] R10: ffffed1038f20131 R11: 0000000000000001 R12: 0000000000000000 [ 197.734296] R13: ffff88810dffc0d0 R14: 0000000000000010 R15: 0000000000000000 [ 197.741493] FS: 0000000000000000(0000) GS:ffff889bbcf80000(0000) knlGS:0000000000000000 [ 197.749659] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 197.755459] CR2: 00007f16c1b42734 CR3: 0000000004814000 CR4: 0000000000350ee0 [ 197.762656] Call Trace: [ 197.765127] <IRQ> [ 197.767162] pm8001ccbtaskfree+0x5f1/0x820 [pm80xx] [ 197.772364] ? dorawspinunlock+0x54/0x220 [ 197.776680] pm8001mpitaskabortresp+0x2ce/0x4f0 [pm80xx] [ 197.782406] processoq+0xe85/0x7890 [pm80xx] [ 197.786817] ? lockacquire+0x194/0x490 [ 197.790697] ? handleirqevent+0x10e/0x1b0 [ 197.794920] ? mpisatacompletion+0x2d70/0x2d70 [pm80xx] [ 197.800378] ? _wakeupbit+0x100/0x100 [ 197.804340] ? lockisheldtype+0x98/0x110 [ 197.808565] pm80xxchipisr+0x94/0x130 [pm80xx] [ 197.813243] taskletactioncommon.constprop.0+0x24b/0x2f0 [ 197.818785] _dosoftirq+0x1b5/0x82d [ 197.822485] ? dorawspinunlock+0x54/0x220 [ 197.826799] _irqexitrcu+0x17e/0x1e0 [ 197.830678] irqexitrcu+0xa/0x20 [ 197.834114] commoninterrupt+0x78/0x90 [ 197.840051] </IRQ> [ 197.844236] <TASK> [ 197.848397] asmcommoninterrupt+0x1e/0x40

Avoid this issue by always initializing the ccb nelem field to 0 in pm8001sendabortall(), pm8001sendreadlog() and pm80xxsendabortall().

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.113-1

Affected versions

5.*

5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.17.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.17.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}