CVE-2022-48823

Source
https://cve.org/CVERecord?id=CVE-2022-48823
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48823.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48823
Downstream
Related
Published
2024-07-16T11:44:09.303Z
Modified
2026-04-11T12:43:03.713160Z
Summary
scsi: qedf: Fix refcount issue when LOGO is received during TMF
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Fix refcount issue when LOGO is received during TMF

Hung task call trace was seen during LOGO processing.

[ 974.309625] host1: rport 016900: Received LOGO request while in state Ready [ 974.309627] host1: rport 016900: Delete port [ 974.309642] host1: rport 016900: work event 3 [ 974.309644] host1: rport 016900: lld callback ev 3 [ 984.031088] INFO: task jbd2/dm-15-8:7645 blocked for more than 120 seconds. [ 984.031136] Not tainted 4.18.0-305.el8.x86_64 #1

[ 984.031166] "echo 0 > /proc/sys/kernel/hungtasktimeout_secs" disables this message. [ 984.031209] jbd2/dm-15-8 D 0 7645 2 0x80004080 [ 984.031212] Call Trace: [ 984.031222] __schedule+0x2c4/0x700 [ 984.031230] ? unfreezepartials.isra.83+0x16e/0x1a0 [ 984.031233] ? bitwaittimeout+0x90/0x90 [ 984.031235] schedule+0x38/0xa0 [ 984.031238] ioschedule+0x12/0x40 [ 984.031240] bitwaitio+0xd/0x50 [ 984.031243] __waitonbit+0x6c/0x80 [ 984.031248] ? freebufferhead+0x21/0x50 [ 984.031251] outoflinewaitonbit+0x91/0xb0 [ 984.031257] ? initwaitvarentry+0x50/0x50 [ 984.031268] jbd2journalcommittransaction+0x112e/0x19f0 [jbd2] [ 984.031280] kjournald2+0xbd/0x270 [jbd2] [ 984.031284] ? finishwait+0x80/0x80 [ 984.031291] ? committimeout+0x10/0x10 [jbd2] [ 984.031294] kthread+0x116/0x130 [ 984.031300] ? kthreadflushworkfn+0x10/0x10 [ 984.031305] retfromfork+0x1f/0x40

There was a ref count issue when LOGO is received during TMF. This leads to one of the I/Os hanging with the driver. Fix the ref count.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48823.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
61d8658b4a435eac729966cc94cdda077a8df5cd
Fixed
7cc32ff0cd6c44a3c26de5faecfe8b5546198fad
Fixed
87f187e5265bc8e3b38faef8b9db864cdd61dde7
Fixed
6be8eaad75ca73131e2a697f0270dc8ee73814a8
Fixed
7fcbed38503bb34c6e6538b6a9482d1c6bead1e8
Fixed
5239ab63f17cee643bd4bf6addfedebaa7d4f41e

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48823.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.11.0
Fixed
5.4.180
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.101
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.24
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.10

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48823.json"