Use-After-Free Vulnerability in Linux Kernel SCSI Module by Vendor
CVE-2022-49730

Currently unrated

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
26 February 2025

Summary

A use-after-free vulnerability has been identified in the Linux kernel's SCSI module. This issue arises when an ELS LOGO (Extended Link Services Log Out) operation is aborted, leading to a potential crash due to the improper handling of the nodelist structure. Upon prematurely releasing the structure, the configuration log verbosity setting for the respective vport may still be accessed, which can result in undefined behaviors or system instability. To mitigate this vulnerability, the lpfc_cmpl_els_logo() function has been adjusted to restrict the possibility of duplicate calls that lead to the release of the nodelist, ensuring safe and reliable handling of resource management.

Affected Version(s)

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 5e83869e29448958f8ae2c6911f350318f75e4fc

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.