CVE-2022-48758
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
20/06/2024
Last modified:
29/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()<br />
<br />
The bnx2fc_destroy() functions are removing the interface before calling<br />
destroy_work. This results multiple WARNings from sysfs_remove_group() as<br />
the controller rport device attributes are removed too early.<br />
<br />
Replace the fcoe_port&#39;s destroy_work queue. It&#39;s not needed.<br />
<br />
The problem is easily reproducible with the following steps.<br />
<br />
Example:<br />
<br />
$ dmesg -w &<br />
$ systemctl enable --now fcoe<br />
$ fipvlan -s -c ens2f1<br />
$ fcoeadm -d ens2f1.802<br />
[ 583.464488] host2: libfc: Link down on port (7500a1)<br />
[ 583.472651] bnx2fc: 7500a1 - rport not created Yet!!<br />
[ 583.490468] ------------[ cut here ]------------<br />
[ 583.538725] sysfs group &#39;power&#39; not found for kobject &#39;rport-2:0-0&#39;<br />
[ 583.568814] WARNING: CPU: 3 PID: 192 at fs/sysfs/group.c:279 sysfs_remove_group+0x6f/0x80<br />
[ 583.607130] Modules linked in: dm_service_time 8021q garp mrp stp llc bnx2fc cnic uio rpcsec_gss_krb5 auth_rpcgss nfsv4 ...<br />
[ 583.942994] CPU: 3 PID: 192 Comm: kworker/3:2 Kdump: loaded Not tainted 5.14.0-39.el9.x86_64 #1<br />
[ 583.984105] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013<br />
[ 584.016535] Workqueue: fc_wq_2 fc_rport_final_delete [scsi_transport_fc]<br />
[ 584.050691] RIP: 0010:sysfs_remove_group+0x6f/0x80<br />
[ 584.074725] Code: ff 5b 48 89 ef 5d 41 5c e9 ee c0 ff ff 48 89 ef e8 f6 b8 ff ff eb d1 49 8b 14 24 48 8b 33 48 c7 c7 ...<br />
[ 584.162586] RSP: 0018:ffffb567c15afdc0 EFLAGS: 00010282<br />
[ 584.188225] RAX: 0000000000000000 RBX: ffffffff8eec4220 RCX: 0000000000000000<br />
[ 584.221053] RDX: ffff8c1586ce84c0 RSI: ffff8c1586cd7cc0 RDI: ffff8c1586cd7cc0<br />
[ 584.255089] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffb567c15afc00<br />
[ 584.287954] R10: ffffb567c15afbf8 R11: ffffffff8fbe7f28 R12: ffff8c1486326400<br />
[ 584.322356] R13: ffff8c1486326480 R14: ffff8c1483a4a000 R15: 0000000000000004<br />
[ 584.355379] FS: 0000000000000000(0000) GS:ffff8c1586cc0000(0000) knlGS:0000000000000000<br />
[ 584.394419] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
[ 584.421123] CR2: 00007fe95a6f7840 CR3: 0000000107674002 CR4: 00000000000606e0<br />
[ 584.454888] Call Trace:<br />
[ 584.466108] device_del+0xb2/0x3e0<br />
[ 584.481701] device_unregister+0x13/0x60<br />
[ 584.501306] bsg_unregister_queue+0x5b/0x80<br />
[ 584.522029] bsg_remove_queue+0x1c/0x40<br />
[ 584.541884] fc_rport_final_delete+0xf3/0x1d0 [scsi_transport_fc]<br />
[ 584.573823] process_one_work+0x1e3/0x3b0<br />
[ 584.592396] worker_thread+0x50/0x3b0<br />
[ 584.609256] ? rescuer_thread+0x370/0x370<br />
[ 584.628877] kthread+0x149/0x170<br />
[ 584.643673] ? set_kthread_struct+0x40/0x40<br />
[ 584.662909] ret_from_fork+0x22/0x30<br />
[ 584.680002] ---[ end trace 53575ecefa942ece ]---
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.2 (including) | 4.4.302 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.5 (including) | 4.9.300 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.265 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.228 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.176 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.96 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.19 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.16.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/00849de10f798a9538242824a51b1756e7110754
- https://git.kernel.org/stable/c/262550f29c750f7876b6ed1244281e72b64ebffb
- https://git.kernel.org/stable/c/2a12fe8248a38437b95b942bbe85aced72e6e2eb
- https://git.kernel.org/stable/c/847f9ea4c5186fdb7b84297e3eeed9e340e83fce
- https://git.kernel.org/stable/c/ace7b6ef41251c5fe47f629a9a922382fb7b0a6b
- https://git.kernel.org/stable/c/b11e34f7bab21df36f02a5e54fb69e858c09a65d
- https://git.kernel.org/stable/c/bf2bd892a0cb14dd2d21f2c658f4b747813be311
- https://git.kernel.org/stable/c/c93a290c862ccfa404e42d7420565730d67cbff9
- https://git.kernel.org/stable/c/de6336b17a1376db1c0f7a528cce8783db0881c0
- https://git.kernel.org/stable/c/00849de10f798a9538242824a51b1756e7110754
- https://git.kernel.org/stable/c/262550f29c750f7876b6ed1244281e72b64ebffb
- https://git.kernel.org/stable/c/2a12fe8248a38437b95b942bbe85aced72e6e2eb
- https://git.kernel.org/stable/c/847f9ea4c5186fdb7b84297e3eeed9e340e83fce
- https://git.kernel.org/stable/c/ace7b6ef41251c5fe47f629a9a922382fb7b0a6b
- https://git.kernel.org/stable/c/b11e34f7bab21df36f02a5e54fb69e858c09a65d
- https://git.kernel.org/stable/c/bf2bd892a0cb14dd2d21f2c658f4b747813be311
- https://git.kernel.org/stable/c/c93a290c862ccfa404e42d7420565730d67cbff9
- https://git.kernel.org/stable/c/de6336b17a1376db1c0f7a528cce8783db0881c0



