CVE-2022-49155

Source
https://cve.org/CVERecord?id=CVE-2022-49155
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49155.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49155
Downstream
Related
Published
2025-02-26T01:55:19.760Z
Modified
2026-04-11T12:43:38.203616Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair()
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Suppress a kernel complaint in qlacreateqpair()

[ 12.323788] BUG: using smpprocessorid() in preemptible [00000000] code: systemd-udevd/1020 [ 12.332297] caller is qla2xxxcreateqpair+0x32a/0x5d0 [qla2xxx] [ 12.338417] CPU: 7 PID: 1020 Comm: systemd-udevd Tainted: G I --------- --- 5.14.0-29.el9.x8664 #1 [ 12.348827] Hardware name: Dell Inc. PowerEdge R610/0F0XJ6, BIOS 6.6.0 05/22/2018 [ 12.356356] Call Trace: [ 12.358821] dumpstacklvl+0x34/0x44 [ 12.362514] checkpreemptiondisabled+0xd9/0xe0 [ 12.367164] qla2xxxcreateqpair+0x32a/0x5d0 [qla2xxx] [ 12.372481] qla2x00probeone+0xa3a/0x1b80 [qla2xxx] [ 12.377617] ? rawspinlockirqsave+0x19/0x40 [ 12.384284] localpciprobe+0x42/0x80 [ 12.390162] ? pcimatchdevice+0xd7/0x110 [ 12.396366] pcideviceprobe+0xfd/0x1b0 [ 12.402372] reallyprobe+0x1e7/0x3e0 [ 12.408114] __driverprobedevice+0xfe/0x180 [ 12.414544] driverprobedevice+0x1e/0x90 [ 12.420685] __driver_attach+0xc0/0x1c0 [ 12.426536] ? __deviceattachdriver+0xe0/0xe0 [ 12.433061] ? __deviceattachdriver+0xe0/0xe0 [ 12.439538] busforeachdev+0x78/0xc0 [ 12.445294] busadddriver+0x12b/0x1e0 [ 12.451021] driverregister+0x8f/0xe0 [ 12.456631] ? 0xffffffffc07bc000 [ 12.461773] qla2x00moduleinit+0x1be/0x229 [qla2xxx] [ 12.468776] dooneinitcall+0x44/0x200 [ 12.474401] ? loadmodule+0xad3/0xba0 [ 12.479908] ? kmemcachealloctrace+0x45/0x410 [ 12.486268] doinitmodule+0x5c/0x280 [ 12.491730] _dosysinitmodule+0x12e/0x1b0 [ 12.497785] dosyscall64+0x3b/0x90 [ 12.503029] entrySYSCALL64afterhwframe+0x44/0xae [ 12.509764] RIP: 0033:0x7f554f73ab2e

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49155.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e326d22af9653dd8eff05d71f0d1bad9174578a3
Fixed
43195a0c620761fbb88db04e2475313855b948a4
Fixed
f68776f28d9134fa65056e7e63bfc734049730b7
Fixed
8077a7162bc3cf658dd9ff112bc77716c08458c5
Fixed
f97316dd393bc8df1cc2af6295a97b876eecf252
Fixed
9c33d49ab9f3d8bd7512b3070cd2f07c4a8849d5
Fixed
1ab81d82fb1db7ec4be4b0d04563513e6d4bcdd5
Fixed
a669a22aef0ceff706b885370af74b5a60a8ac85
Fixed
a60447e7d451df42c7bde43af53b34f10f34f469

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49155.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.13.0
Fixed
4.14.276
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.238
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.189
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.110
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.33
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.19
Type
ECOSYSTEM
Events
Introduced
5.17.0
Fixed
5.17.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49155.json"