CVE-2022-49158

Source
https://cve.org/CVERecord?id=CVE-2022-49158
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49158.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49158
Downstream
Related
Published
2025-02-26T01:55:21.304Z
Modified
2026-04-11T12:43:38.216873Z
Summary
scsi: qla2xxx: Fix warning message due to adisc being flushed
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix warning message due to adisc being flushed

Fix warning message due to adisc being flushed. Linux kernel triggered a warning message where a different error code type is not matching up with the expected type. Add additional translation of one error code type to another.

WARNING: CPU: 2 PID: 1131623 at drivers/scsi/qla2xxx/qlainit.c:498 qla2x00asyncadiscspdone+0x294/0x2b0 [qla2xxx] CPU: 2 PID: 1131623 Comm: drmgr Not tainted 5.13.0-rc1-autotest #1 .. GPR28: c000000aaa9c8890 c0080000079ab678 c00000140a104800 c00000002bd19000 NIP [c00800000790857c] qla2x00asyncadiscspdone+0x294/0x2b0 [qla2xxx] LR [c008000007908578] qla2x00asyncadiscspdone+0x290/0x2b0 [qla2xxx] Call Trace: [c00000001cdc3620] [c008000007908578] qla2x00asyncadiscsp_done+0x290/0x2b0 [qla2xxx] (unreliable) [c00000001cdc3710] [c0080000078f3080] __qla2x00abortallcmds+0x1b8/0x580 [qla2xxx] [c00000001cdc3840] [c0080000078f589c] qla2x00abortallcmds+0x34/0xd0 [qla2xxx] [c00000001cdc3880] [c0080000079153d8] qla2x00abortispcleanup+0x3f0/0x570 [qla2xxx] [c00000001cdc3920] [c0080000078fb7e8] qla2x00removeone+0x3d0/0x480 [qla2xxx] [c00000001cdc39b0] [c00000000071c274] pcideviceremove+0x64/0x120 [c00000001cdc39f0] [c0000000007fb818] devicereleasedriverinternal+0x168/0x2a0 [c00000001cdc3a30] [c00000000070e304] pcistopbusdevice+0xb4/0x100 [c00000001cdc3a70] [c00000000070e4f0] pcistopandremovebusdevice+0x20/0x40 [c00000001cdc3aa0] [c000000000073940] pcihpremovedevices+0x90/0x130 [c00000001cdc3b30] [c0080000070704d0] disableslot+0x38/0x90 [rpaphp] [ c00000001cdc3b60] [c00000000073eb4c] powerwritefile+0xcc/0x180 [c00000001cdc3be0] [c0000000007354bc] pcislotattrstore+0x3c/0x60 [c00000001cdc3c00] [c00000000055f820] sysfskfwrite+0x60/0x80 [c00000001cdc3c20] [c00000000055df10] kernfsfopwriteiter+0x1a0/0x290 [c00000001cdc3c70] [c000000000447c4c] newsyncwrite+0x14c/0x1d0 [c00000001cdc3d10] [c00000000044b134] vfswrite+0x224/0x330 [c00000001cdc3d60] [c00000000044b3f4] ksyswrite+0x74/0x130 [c00000001cdc3db0] [c00000000002df70] systemcallexception+0x150/0x2d0 [c00000001cdc3e10] [c00000000000d45c] systemcallcommon+0xec/0x278

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49158.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0616e9658aca6990394cf255ad2f655194049881
Fixed
7a3457777c4f700c64836e78dc71e6ce459f62b8
Fixed
b13baf97ddbc1a7e7536168383bc0d84c2204b03
Fixed
d8fb8da69e194e0249b3cdb746ef09ce823ae26b
Fixed
64f24af75b79cba3b86b0760e27e0fa904db570f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49158.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.16.0
Fixed
5.15.33
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.19
Type
ECOSYSTEM
Events
Introduced
5.17.0
Fixed
5.17.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49158.json"