CVE-2022-49217

Source
https://cve.org/CVERecord?id=CVE-2022-49217
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49217.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49217
Downstream
Related
Published
2025-02-26T01:55:51.156Z
Modified
2026-03-12T03:24:50.772280Z
Summary
scsi: pm8001: Fix abort all task initialization
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: pm8001: Fix abort all task initialization

In pm80xxsendabortall(), the nelem field of the ccb used is not initialized to 0. This missing initialization sometimes lead to the task completion path seeing the ccb with a non-zero nelem resulting in the execution of invalid dmaunmapsg() calls in pm8001ccbtaskfree(), causing a crash such as:

[ 197.676341] RIP: 0010:iommudmaunmapsg+0x6d/0x280 [ 197.700204] RSP: 0018:ffff889bbcf89c88 EFLAGS: 00010012 [ 197.705485] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff83d0bda0 [ 197.712687] RDX: 0000000000000002 RSI: 0000000000000000 RDI: ffff88810dffc0d0 [ 197.719887] RBP: 0000000000000000 R08: 0000000000000000 R09: ffff8881c790098b [ 197.727089] R10: ffffed1038f20131 R11: 0000000000000001 R12: 0000000000000000 [ 197.734296] R13: ffff88810dffc0d0 R14: 0000000000000010 R15: 0000000000000000 [ 197.741493] FS: 0000000000000000(0000) GS:ffff889bbcf80000(0000) knlGS:0000000000000000 [ 197.749659] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 197.755459] CR2: 00007f16c1b42734 CR3: 0000000004814000 CR4: 0000000000350ee0 [ 197.762656] Call Trace: [ 197.765127] <IRQ> [ 197.767162] pm8001ccbtaskfree+0x5f1/0x820 [pm80xx] [ 197.772364] ? dorawspinunlock+0x54/0x220 [ 197.776680] pm8001mpitaskabortresp+0x2ce/0x4f0 [pm80xx] [ 197.782406] processoq+0xe85/0x7890 [pm80xx] [ 197.786817] ? lockacquire+0x194/0x490 [ 197.790697] ? handleirqevent+0x10e/0x1b0 [ 197.794920] ? mpisata_completion+0x2d70/0x2d70 [pm80xx] [ 197.800378] ? __wakeupbit+0x100/0x100 [ 197.804340] ? lockisheldtype+0x98/0x110 [ 197.808565] pm80xxchipisr+0x94/0x130 [pm80xx] [ 197.813243] taskletaction_common.constprop.0+0x24b/0x2f0 [ 197.818785] __dosoftirq+0x1b5/0x82d [ 197.822485] ? dorawspinunlock+0x54/0x220 [ 197.826799] _irqexitrcu+0x17e/0x1e0 [ 197.830678] irqexitrcu+0xa/0x20 [ 197.834114] commoninterrupt+0x78/0x90 [ 197.840051] </IRQ> [ 197.844236] <TASK> [ 197.848397] asmcommoninterrupt+0x1e/0x40

Avoid this issue by always initializing the ccb nelem field to 0 in pm8001sendabortall(), pm8001sendreadlog() and pm80xxsendabortall().

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49217.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c6b9ef5779c3e1edfa9de949d2a51252bc347663
Fixed
9914461db82caee6c519acfbe10a86fe11bcdeca
Fixed
d6ec4471550cc53e96485a7124c5891e6a38d1c3
Fixed
1824a21b2cedc5774a5adfa74f5f7b90472d8677
Fixed
765674e3b30121782a2b792684554baa48c61f5e
Fixed
279f318bd7d6e04e6e0bc7b8cd8e190da8fa37a4
Fixed
c8db786858d895ac58342f67767b4999ae6538fa
Fixed
326d894adf89f3c707b7784becbe241830daaab6
Fixed
16cd02e0951b520bef324adb9a35afcc92501caf
Fixed
7f12845c8389855dbcc67baa068b6832dc4a396e

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49217.json"