CVE-2022-48825
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/07/2024
Last modified:
07/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
scsi: qedf: Add stag_work to all the vports<br />
<br />
Call trace seen when creating NPIV ports, only 32 out of 64 show online.<br />
stag work was not initialized for vport, hence initialize the stag work.<br />
<br />
WARNING: CPU: 8 PID: 645 at kernel/workqueue.c:1635 __queue_delayed_work+0x68/0x80<br />
CPU: 8 PID: 645 Comm: kworker/8:1 Kdump: loaded Tainted: G IOE --------- --<br />
4.18.0-348.el8.x86_64 #1<br />
Hardware name: Dell Inc. PowerEdge MX740c/0177V9, BIOS 2.12.2 07/09/2021<br />
Workqueue: events fc_lport_timeout [libfc]<br />
RIP: 0010:__queue_delayed_work+0x68/0x80<br />
Code: 89 b2 88 00 00 00 44 89 82 90 00 00 00 48 01 c8 48 89 42 50 41 81<br />
f8 00 20 00 00 75 1d e9 60 24 07 00 44 89 c7 e9 98 f6 ff ff 0b eb<br />
c5 0f 0b eb a1 0f 0b eb a7 0f 0b eb ac 44 89 c6 e9 40 23<br />
RSP: 0018:ffffae514bc3be40 EFLAGS: 00010006<br />
RAX: ffff8d25d6143750 RBX: 0000000000000202 RCX: 0000000000000002<br />
RDX: ffff8d2e31383748 RSI: ffff8d25c000d600 RDI: ffff8d2e31383788<br />
RBP: ffff8d2e31380de0 R08: 0000000000002000 R09: ffff8d2e31383750<br />
R10: ffffffffc0c957e0 R11: ffff8d2624800000 R12: ffff8d2e31380a58<br />
R13: ffff8d2d915eb000 R14: ffff8d25c499b5c0 R15: ffff8d2e31380e18<br />
FS: 0000000000000000(0000) GS:ffff8d2d1fb00000(0000) knlGS:0000000000000000<br />
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
CR2: 000055fd0484b8b8 CR3: 00000008ffc10006 CR4: 00000000007706e0<br />
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br />
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br />
PKRU: 55555554<br />
Call Trace:<br />
queue_delayed_work_on+0x36/0x40<br />
qedf_elsct_send+0x57/0x60 [qedf]<br />
fc_lport_enter_flogi+0x90/0xc0 [libfc]<br />
fc_lport_timeout+0xb7/0x140 [libfc]<br />
process_one_work+0x1a7/0x360<br />
? create_worker+0x1a0/0x1a0<br />
worker_thread+0x30/0x390<br />
? create_worker+0x1a0/0x1a0<br />
kthread+0x116/0x130<br />
? kthread_flush_work_fn+0x10/0x10<br />
ret_from_fork+0x35/0x40<br />
---[ end trace 008f00f722f2c2ff ]--<br />
<br />
Initialize stag work for all the vports.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.11 (including) | 5.10.101 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.16.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0be556512cd0dfcf5ec1a140d9f42d88221a5d4e
- https://git.kernel.org/stable/c/1f53bbf27a876f7e61262bd74c18680ac11d4c31
- https://git.kernel.org/stable/c/aa7352aa155e19815b41f09f114fe9f110fde4d8
- https://git.kernel.org/stable/c/b70a99fd13282d7885f69bf1372e28b7506a1613
- https://git.kernel.org/stable/c/0be556512cd0dfcf5ec1a140d9f42d88221a5d4e
- https://git.kernel.org/stable/c/1f53bbf27a876f7e61262bd74c18680ac11d4c31
- https://git.kernel.org/stable/c/aa7352aa155e19815b41f09f114fe9f110fde4d8
- https://git.kernel.org/stable/c/b70a99fd13282d7885f69bf1372e28b7506a1613



