CVE-2022-48825

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-48825
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48825.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-48825
Downstream
Related
Published
2024-07-16T11:44:10Z
Modified
2025-10-21T08:42:11.250583Z
Summary
scsi: qedf: Add stag_work to all the vports
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Add stag_work to all the vports

Call trace seen when creating NPIV ports, only 32 out of 64 show online. stag work was not initialized for vport, hence initialize the stag work.

WARNING: CPU: 8 PID: 645 at kernel/workqueue.c:1635 queuedelayedwork+0x68/0x80 CPU: 8 PID: 645 Comm: kworker/8:1 Kdump: loaded Tainted: G IOE --------- -- 4.18.0-348.el8.x8664 #1 Hardware name: Dell Inc. PowerEdge MX740c/0177V9, BIOS 2.12.2 07/09/2021 Workqueue: events fclporttimeout [libfc] RIP: 0010:queuedelayedwork+0x68/0x80 Code: 89 b2 88 00 00 00 44 89 82 90 00 00 00 48 01 c8 48 89 42 50 41 81 f8 00 20 00 00 75 1d e9 60 24 07 00 44 89 c7 e9 98 f6 ff ff <0f> 0b eb c5 0f 0b eb a1 0f 0b eb a7 0f 0b eb ac 44 89 c6 e9 40 23 RSP: 0018:ffffae514bc3be40 EFLAGS: 00010006 RAX: ffff8d25d6143750 RBX: 0000000000000202 RCX: 0000000000000002 RDX: ffff8d2e31383748 RSI: ffff8d25c000d600 RDI: ffff8d2e31383788 RBP: ffff8d2e31380de0 R08: 0000000000002000 R09: ffff8d2e31383750 R10: ffffffffc0c957e0 R11: ffff8d2624800000 R12: ffff8d2e31380a58 R13: ffff8d2d915eb000 R14: ffff8d25c499b5c0 R15: ffff8d2e31380e18 FS: 0000000000000000(0000) GS:ffff8d2d1fb00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055fd0484b8b8 CR3: 00000008ffc10006 CR4: 00000000007706e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: queuedelayedworkon+0x36/0x40 qedfelsctsend+0x57/0x60 [qedf] fclportenterflogi+0x90/0xc0 [libfc] fclporttimeout+0xb7/0x140 [libfc] processonework+0x1a7/0x360 ? createworker+0x1a0/0x1a0 workerthread+0x30/0x390 ? createworker+0x1a0/0x1a0 kthread+0x116/0x130 ? kthreadflushworkfn+0x10/0x10 retfrom_fork+0x35/0x40 ---[ end trace 008f00f722f2c2ff ]--

Initialize stag work for all the vports.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
61d8658b4a435eac729966cc94cdda077a8df5cd
Fixed
aa7352aa155e19815b41f09f114fe9f110fde4d8
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
61d8658b4a435eac729966cc94cdda077a8df5cd
Fixed
1f53bbf27a876f7e61262bd74c18680ac11d4c31
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
61d8658b4a435eac729966cc94cdda077a8df5cd
Fixed
0be556512cd0dfcf5ec1a140d9f42d88221a5d4e
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
61d8658b4a435eac729966cc94cdda077a8df5cd
Fixed
b70a99fd13282d7885f69bf1372e28b7506a1613

Affected versions

v4.*

v4.11
v4.11-rc1
v4.11-rc2
v4.11-rc3
v4.11-rc4
v4.11-rc5
v4.11-rc6
v4.11-rc7
v4.11-rc8
v4.12
v4.12-rc1
v4.12-rc2
v4.12-rc3
v4.12-rc4
v4.12-rc5
v4.12-rc6
v4.12-rc7
v4.13
v4.13-rc1
v4.13-rc2
v4.13-rc3
v4.13-rc4
v4.13-rc5
v4.13-rc6
v4.13-rc7
v4.14
v4.14-rc1
v4.14-rc2
v4.14-rc3
v4.14-rc4
v4.14-rc5
v4.14-rc6
v4.14-rc7
v4.14-rc8
v4.15
v4.15-rc1
v4.15-rc2
v4.15-rc3
v4.15-rc4
v4.15-rc5
v4.15-rc6
v4.15-rc7
v4.15-rc8
v4.15-rc9
v4.16
v4.16-rc1
v4.16-rc2
v4.16-rc3
v4.16-rc4
v4.16-rc5
v4.16-rc6
v4.16-rc7
v4.17
v4.17-rc1
v4.17-rc2
v4.17-rc3
v4.17-rc4
v4.17-rc5
v4.17-rc6
v4.17-rc7
v4.18
v4.18-rc1
v4.18-rc2
v4.18-rc3
v4.18-rc4
v4.18-rc5
v4.18-rc6
v4.18-rc7
v4.18-rc8
v4.19
v4.19-rc1
v4.19-rc2
v4.19-rc3
v4.19-rc4
v4.19-rc5
v4.19-rc6
v4.19-rc7
v4.19-rc8
v4.20
v4.20-rc1
v4.20-rc2
v4.20-rc3
v4.20-rc4
v4.20-rc5
v4.20-rc6
v4.20-rc7

v5.*

v5.0
v5.0-rc1
v5.0-rc2
v5.0-rc3
v5.0-rc4
v5.0-rc5
v5.0-rc6
v5.0-rc7
v5.0-rc8
v5.1
v5.1-rc1
v5.1-rc2
v5.1-rc3
v5.1-rc4
v5.1-rc5
v5.1-rc6
v5.1-rc7
v5.10
v5.10-rc1
v5.10-rc2
v5.10-rc3
v5.10-rc4
v5.10-rc5
v5.10-rc6
v5.10-rc7
v5.10.1
v5.10.10
v5.10.100
v5.10.11
v5.10.12
v5.10.13
v5.10.14
v5.10.15
v5.10.16
v5.10.17
v5.10.18
v5.10.19
v5.10.2
v5.10.20
v5.10.21
v5.10.22
v5.10.23
v5.10.24
v5.10.25
v5.10.26
v5.10.27
v5.10.28
v5.10.29
v5.10.3
v5.10.30
v5.10.31
v5.10.32
v5.10.33
v5.10.34
v5.10.35
v5.10.36
v5.10.37
v5.10.38
v5.10.39
v5.10.4
v5.10.40
v5.10.41
v5.10.42
v5.10.43
v5.10.44
v5.10.45
v5.10.46
v5.10.47
v5.10.48
v5.10.49
v5.10.5
v5.10.50
v5.10.51
v5.10.52
v5.10.53
v5.10.54
v5.10.55
v5.10.56
v5.10.57
v5.10.58
v5.10.59
v5.10.6
v5.10.60
v5.10.61
v5.10.62
v5.10.63
v5.10.64
v5.10.65
v5.10.66
v5.10.67
v5.10.68
v5.10.69
v5.10.7
v5.10.70
v5.10.71
v5.10.72
v5.10.73
v5.10.74
v5.10.75
v5.10.76
v5.10.77
v5.10.78
v5.10.79
v5.10.8
v5.10.80
v5.10.81
v5.10.82
v5.10.83
v5.10.84
v5.10.85
v5.10.86
v5.10.87
v5.10.88
v5.10.89
v5.10.9
v5.10.90
v5.10.91
v5.10.92
v5.10.93
v5.10.94
v5.10.95
v5.10.96
v5.10.97
v5.10.98
v5.10.99
v5.11
v5.11-rc1
v5.11-rc2
v5.11-rc3
v5.11-rc4
v5.11-rc5
v5.11-rc6
v5.11-rc7
v5.12
v5.12-rc1
v5.12-rc1-dontuse
v5.12-rc2
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.3
v5.15.4
v5.15.5
v5.15.6
v5.15.7
v5.15.8
v5.15.9
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.16.1
v5.16.2
v5.16.3
v5.16.4
v5.16.5
v5.16.6
v5.16.7
v5.16.8
v5.16.9
v5.17-rc1
v5.2
v5.2-rc1
v5.2-rc2
v5.2-rc3
v5.2-rc4
v5.2-rc5
v5.2-rc6
v5.2-rc7
v5.3
v5.3-rc1
v5.3-rc2
v5.3-rc3
v5.3-rc4
v5.3-rc5
v5.3-rc6
v5.3-rc7
v5.3-rc8
v5.4
v5.4-rc1
v5.4-rc2
v5.4-rc3
v5.4-rc4
v5.4-rc5
v5.4-rc6
v5.4-rc7
v5.4-rc8
v5.5
v5.5-rc1
v5.5-rc2
v5.5-rc3
v5.5-rc4
v5.5-rc5
v5.5-rc6
v5.5-rc7
v5.6
v5.6-rc1
v5.6-rc2
v5.6-rc3
v5.6-rc4
v5.6-rc5
v5.6-rc6
v5.6-rc7
v5.7
v5.7-rc1
v5.7-rc2
v5.7-rc3
v5.7-rc4
v5.7-rc5
v5.7-rc6
v5.7-rc7
v5.8
v5.8-rc1
v5.8-rc2
v5.8-rc3
v5.8-rc4
v5.8-rc5
v5.8-rc6
v5.8-rc7
v5.9
v5.9-rc1
v5.9-rc2
v5.9-rc3
v5.9-rc4
v5.9-rc5
v5.9-rc6
v5.9-rc7
v5.9-rc8

Database specific

vanir_signatures

[
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aa7352aa155e19815b41f09f114fe9f110fde4d8",
        "target": {
            "function": "qedf_vport_create",
            "file": "drivers/scsi/qedf/qedf_main.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "id": "CVE-2022-48825-281e4836",
        "signature_type": "Function",
        "digest": {
            "function_hash": "263665950540270480035253722715209055501",
            "length": 2609.0
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aa7352aa155e19815b41f09f114fe9f110fde4d8",
        "target": {
            "file": "drivers/scsi/qedf/qedf_main.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "id": "CVE-2022-48825-2c237c93",
        "signature_type": "Line",
        "digest": {
            "line_hashes": [
                "34512993911982664569513318247661362811",
                "338407432860203985564170662595786011309",
                "228796610629879143546289630770286291179",
                "316697721825951567301416118734188945128"
            ],
            "threshold": 0.9
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0be556512cd0dfcf5ec1a140d9f42d88221a5d4e",
        "target": {
            "file": "drivers/scsi/qedf/qedf_main.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "id": "CVE-2022-48825-3d5c3b87",
        "signature_type": "Line",
        "digest": {
            "line_hashes": [
                "34512993911982664569513318247661362811",
                "338407432860203985564170662595786011309",
                "228796610629879143546289630770286291179",
                "316697721825951567301416118734188945128"
            ],
            "threshold": 0.9
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1f53bbf27a876f7e61262bd74c18680ac11d4c31",
        "target": {
            "function": "qedf_vport_create",
            "file": "drivers/scsi/qedf/qedf_main.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "id": "CVE-2022-48825-719d3ef0",
        "signature_type": "Function",
        "digest": {
            "function_hash": "21234871818014748616496136460169666221",
            "length": 2653.0
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0be556512cd0dfcf5ec1a140d9f42d88221a5d4e",
        "target": {
            "function": "qedf_vport_create",
            "file": "drivers/scsi/qedf/qedf_main.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "id": "CVE-2022-48825-93c9c56d",
        "signature_type": "Function",
        "digest": {
            "function_hash": "21234871818014748616496136460169666221",
            "length": 2653.0
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b70a99fd13282d7885f69bf1372e28b7506a1613",
        "target": {
            "file": "drivers/scsi/qedf/qedf_main.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "id": "CVE-2022-48825-9919be24",
        "signature_type": "Line",
        "digest": {
            "line_hashes": [
                "34512993911982664569513318247661362811",
                "338407432860203985564170662595786011309",
                "228796610629879143546289630770286291179",
                "316697721825951567301416118734188945128"
            ],
            "threshold": 0.9
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b70a99fd13282d7885f69bf1372e28b7506a1613",
        "target": {
            "function": "qedf_vport_create",
            "file": "drivers/scsi/qedf/qedf_main.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "id": "CVE-2022-48825-a12780e3",
        "signature_type": "Function",
        "digest": {
            "function_hash": "21234871818014748616496136460169666221",
            "length": 2653.0
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1f53bbf27a876f7e61262bd74c18680ac11d4c31",
        "target": {
            "file": "drivers/scsi/qedf/qedf_main.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "id": "CVE-2022-48825-f1520773",
        "signature_type": "Line",
        "digest": {
            "line_hashes": [
                "34512993911982664569513318247661362811",
                "338407432860203985564170662595786011309",
                "228796610629879143546289630770286291179",
                "316697721825951567301416118734188945128"
            ],
            "threshold": 0.9
        }
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.11.0
Fixed
5.10.101
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.24
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.10