CVE-2022-49158

Source
https://cve.org/CVERecord?id=CVE-2022-49158
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49158.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49158
Downstream
Related
Published
2025-02-26T01:55:21.304Z
Modified
2026-03-20T12:22:13.218067Z
Summary
scsi: qla2xxx: Fix warning message due to adisc being flushed
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix warning message due to adisc being flushed

Fix warning message due to adisc being flushed. Linux kernel triggered a warning message where a different error code type is not matching up with the expected type. Add additional translation of one error code type to another.

WARNING: CPU: 2 PID: 1131623 at drivers/scsi/qla2xxx/qlainit.c:498 qla2x00asyncadiscspdone+0x294/0x2b0 [qla2xxx] CPU: 2 PID: 1131623 Comm: drmgr Not tainted 5.13.0-rc1-autotest #1 .. GPR28: c000000aaa9c8890 c0080000079ab678 c00000140a104800 c00000002bd19000 NIP [c00800000790857c] qla2x00asyncadiscspdone+0x294/0x2b0 [qla2xxx] LR [c008000007908578] qla2x00asyncadiscspdone+0x290/0x2b0 [qla2xxx] Call Trace: [c00000001cdc3620] [c008000007908578] qla2x00asyncadiscsp_done+0x290/0x2b0 [qla2xxx] (unreliable) [c00000001cdc3710] [c0080000078f3080] __qla2x00abortallcmds+0x1b8/0x580 [qla2xxx] [c00000001cdc3840] [c0080000078f589c] qla2x00abortallcmds+0x34/0xd0 [qla2xxx] [c00000001cdc3880] [c0080000079153d8] qla2x00abortispcleanup+0x3f0/0x570 [qla2xxx] [c00000001cdc3920] [c0080000078fb7e8] qla2x00removeone+0x3d0/0x480 [qla2xxx] [c00000001cdc39b0] [c00000000071c274] pcideviceremove+0x64/0x120 [c00000001cdc39f0] [c0000000007fb818] devicereleasedriverinternal+0x168/0x2a0 [c00000001cdc3a30] [c00000000070e304] pcistopbusdevice+0xb4/0x100 [c00000001cdc3a70] [c00000000070e4f0] pcistopandremovebusdevice+0x20/0x40 [c00000001cdc3aa0] [c000000000073940] pcihpremovedevices+0x90/0x130 [c00000001cdc3b30] [c0080000070704d0] disableslot+0x38/0x90 [rpaphp] [ c00000001cdc3b60] [c00000000073eb4c] powerwritefile+0xcc/0x180 [c00000001cdc3be0] [c0000000007354bc] pcislotattrstore+0x3c/0x60 [c00000001cdc3c00] [c00000000055f820] sysfskfwrite+0x60/0x80 [c00000001cdc3c20] [c00000000055df10] kernfsfopwriteiter+0x1a0/0x290 [c00000001cdc3c70] [c000000000447c4c] newsyncwrite+0x14c/0x1d0 [c00000001cdc3d10] [c00000000044b134] vfswrite+0x224/0x330 [c00000001cdc3d60] [c00000000044b3f4] ksyswrite+0x74/0x130 [c00000001cdc3db0] [c00000000002df70] systemcallexception+0x150/0x2d0 [c00000001cdc3e10] [c00000000000d45c] systemcallcommon+0xec/0x278

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49158.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0616e9658aca6990394cf255ad2f655194049881
Fixed
7a3457777c4f700c64836e78dc71e6ce459f62b8
Fixed
b13baf97ddbc1a7e7536168383bc0d84c2204b03
Fixed
d8fb8da69e194e0249b3cdb746ef09ce823ae26b
Fixed
64f24af75b79cba3b86b0760e27e0fa904db570f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49158.json"