CVE-2022-49155: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() [ 12.323788] BUG: using smp_processor_id() in preemptible [00000000] code: systemd-udevd/1020 [ 12.332297] caller is qla2xxx_create_qpair+0x32a/0x5d0 [qla2xxx] [ 12.338417] CPU: 7 PID: 1020 Comm: systemd-udevd Tainted: G I --------- --- 5.14.0-29.el9.x86_64 #1 [ 12.348827] Hardware name: Dell Inc. PowerEdge R610/0F0XJ6, BIOS 6.6.0 05/22/2018 [ 12.356356] Call Trace: [ 12.358821] dump_stack_lvl+0x34/0x44 [ 12.362514] check_preemption_disabled+0xd9/0xe0 [ 12.367164] qla2xxx_create_qpair+0x32a/0x5d0 [qla2xxx] [ 12.372481] qla2x00_probe_one+0xa3a/0x1b80 [qla2xxx] [ 12.377617] ? _raw_spin_lock_irqsave+0x19/0x40 [ 12.384284] local_pci_probe+0x42/0x80 [ 12.390162] ? pci_match_device+0xd7/0x110 [ 12.396366] pci_device_probe+0xfd/0x1b0 [ 12.402372] really_probe+0x1e7/0x3e0 [ 12.408114] __driver_probe_device+0xfe/0x180 [ 12.414544] driver_probe_device+0x1e/0x90 [ 12.420685] __driver_attach+0xc0/0x1c0 [ 12.426536] ? __device_attach_driver+0xe0/0xe0 [ 12.433061] ? __device_attach_driver+0xe0/0xe0 [ 12.439538] bus_for_each_dev+0x78/0xc0 [ 12.445294] bus_add_driver+0x12b/0x1e0 [ 12.451021] driver_register+0x8f/0xe0 [ 12.456631] ? 0xffffffffc07bc000 [ 12.461773] qla2x00_module_init+0x1be/0x229 [qla2xxx] [ 12.468776] do_one_initcall+0x44/0x200 [ 12.474401] ? load_module+0xad3/0xba0 [ 12.479908] ? kmem_cache_alloc_trace+0x45/0x410 [ 12.486268] do_init_module+0x5c/0x280 [ 12.491730] __do_sys_init_module+0x12e/0x1b0 [ 12.497785] do_syscall_64+0x3b/0x90 [ 12.503029] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 12.509764] RIP: 0033:0x7f554f73ab2e
AI Analysis
Technical Summary
CVE-2022-49155 is a vulnerability identified in the Linux kernel specifically related to the qla2xxx driver, which is a driver for QLogic Fibre Channel Host Bus Adapters (HBAs). The vulnerability concerns the function qla_create_qpair(), where a kernel complaint arises due to the use of smp_processor_id() in preemptible code. This improper usage can lead to kernel warnings or bugs, as indicated by the kernel log snippet showing a BUG triggered by systemd-udevd process during device probing on a Dell PowerEdge R610 server. The root cause is the invocation of smp_processor_id() in a context where preemption is enabled, which is unsafe and can cause race conditions or inconsistent CPU identification. The qla2xxx driver is responsible for managing communication between the operating system and QLogic Fibre Channel HBAs, which are commonly used in enterprise storage networks. The vulnerability does not appear to be directly exploitable for remote code execution or privilege escalation but can cause system instability or crashes during device initialization or probing, potentially leading to denial of service conditions. The affected versions are identified by a specific commit hash repeated multiple times, indicating a particular kernel source state. No CVSS score has been assigned, and there are no known exploits in the wild. The vulnerability was published on February 26, 2025, and no patches or mitigations are linked in the provided data, though it is implied that a fix has been applied in the Linux kernel source to suppress the kernel complaint. This issue is primarily a stability and reliability concern within the kernel's SCSI subsystem for systems using QLogic HBAs.
Potential Impact
For European organizations, particularly those operating data centers, cloud infrastructure, or enterprise storage solutions that rely on Linux servers with QLogic Fibre Channel HBAs, this vulnerability could lead to system instability or unexpected kernel crashes during device initialization or hot-plug events. This can result in denial of service conditions affecting critical storage access, impacting business continuity and data availability. Organizations with high-availability storage networks or SAN environments may experience disruptions in storage connectivity, potentially affecting database servers, virtualization hosts, or backup systems. While the vulnerability does not appear to allow privilege escalation or remote code execution, the risk of kernel panics or system reboots can cause operational downtime and increased maintenance overhead. The impact is more pronounced in environments with automated device probing or frequent hardware changes. Given the lack of known exploits, the immediate threat level is moderate, but the potential for service disruption in critical infrastructure is significant for organizations dependent on affected hardware and kernel versions.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to versions where this vulnerability is resolved, ensuring that the qla2xxx driver no longer uses smp_processor_id() in preemptible contexts. Since no direct patch links are provided, organizations should track official Linux kernel security advisories and vendor-specific updates (e.g., Red Hat, SUSE, Canonical) for patched kernel releases. Additionally, organizations should audit their infrastructure to identify servers using QLogic Fibre Channel HBAs and verify kernel versions for vulnerability exposure. Implementing kernel crash monitoring and alerting can help detect early signs of instability related to this issue. For environments where immediate kernel updates are not feasible, temporarily disabling or limiting hot-plugging or device probing of QLogic HBAs during critical operations may reduce the risk of triggering the bug. Coordination with hardware vendors for firmware updates or driver alternatives could also be beneficial. Finally, thorough testing of kernel updates in staging environments before production deployment is recommended to ensure stability and compatibility.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2022-49155: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() [ 12.323788] BUG: using smp_processor_id() in preemptible [00000000] code: systemd-udevd/1020 [ 12.332297] caller is qla2xxx_create_qpair+0x32a/0x5d0 [qla2xxx] [ 12.338417] CPU: 7 PID: 1020 Comm: systemd-udevd Tainted: G I --------- --- 5.14.0-29.el9.x86_64 #1 [ 12.348827] Hardware name: Dell Inc. PowerEdge R610/0F0XJ6, BIOS 6.6.0 05/22/2018 [ 12.356356] Call Trace: [ 12.358821] dump_stack_lvl+0x34/0x44 [ 12.362514] check_preemption_disabled+0xd9/0xe0 [ 12.367164] qla2xxx_create_qpair+0x32a/0x5d0 [qla2xxx] [ 12.372481] qla2x00_probe_one+0xa3a/0x1b80 [qla2xxx] [ 12.377617] ? _raw_spin_lock_irqsave+0x19/0x40 [ 12.384284] local_pci_probe+0x42/0x80 [ 12.390162] ? pci_match_device+0xd7/0x110 [ 12.396366] pci_device_probe+0xfd/0x1b0 [ 12.402372] really_probe+0x1e7/0x3e0 [ 12.408114] __driver_probe_device+0xfe/0x180 [ 12.414544] driver_probe_device+0x1e/0x90 [ 12.420685] __driver_attach+0xc0/0x1c0 [ 12.426536] ? __device_attach_driver+0xe0/0xe0 [ 12.433061] ? __device_attach_driver+0xe0/0xe0 [ 12.439538] bus_for_each_dev+0x78/0xc0 [ 12.445294] bus_add_driver+0x12b/0x1e0 [ 12.451021] driver_register+0x8f/0xe0 [ 12.456631] ? 0xffffffffc07bc000 [ 12.461773] qla2x00_module_init+0x1be/0x229 [qla2xxx] [ 12.468776] do_one_initcall+0x44/0x200 [ 12.474401] ? load_module+0xad3/0xba0 [ 12.479908] ? kmem_cache_alloc_trace+0x45/0x410 [ 12.486268] do_init_module+0x5c/0x280 [ 12.491730] __do_sys_init_module+0x12e/0x1b0 [ 12.497785] do_syscall_64+0x3b/0x90 [ 12.503029] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 12.509764] RIP: 0033:0x7f554f73ab2e
AI-Powered Analysis
Technical Analysis
CVE-2022-49155 is a vulnerability identified in the Linux kernel specifically related to the qla2xxx driver, which is a driver for QLogic Fibre Channel Host Bus Adapters (HBAs). The vulnerability concerns the function qla_create_qpair(), where a kernel complaint arises due to the use of smp_processor_id() in preemptible code. This improper usage can lead to kernel warnings or bugs, as indicated by the kernel log snippet showing a BUG triggered by systemd-udevd process during device probing on a Dell PowerEdge R610 server. The root cause is the invocation of smp_processor_id() in a context where preemption is enabled, which is unsafe and can cause race conditions or inconsistent CPU identification. The qla2xxx driver is responsible for managing communication between the operating system and QLogic Fibre Channel HBAs, which are commonly used in enterprise storage networks. The vulnerability does not appear to be directly exploitable for remote code execution or privilege escalation but can cause system instability or crashes during device initialization or probing, potentially leading to denial of service conditions. The affected versions are identified by a specific commit hash repeated multiple times, indicating a particular kernel source state. No CVSS score has been assigned, and there are no known exploits in the wild. The vulnerability was published on February 26, 2025, and no patches or mitigations are linked in the provided data, though it is implied that a fix has been applied in the Linux kernel source to suppress the kernel complaint. This issue is primarily a stability and reliability concern within the kernel's SCSI subsystem for systems using QLogic HBAs.
Potential Impact
For European organizations, particularly those operating data centers, cloud infrastructure, or enterprise storage solutions that rely on Linux servers with QLogic Fibre Channel HBAs, this vulnerability could lead to system instability or unexpected kernel crashes during device initialization or hot-plug events. This can result in denial of service conditions affecting critical storage access, impacting business continuity and data availability. Organizations with high-availability storage networks or SAN environments may experience disruptions in storage connectivity, potentially affecting database servers, virtualization hosts, or backup systems. While the vulnerability does not appear to allow privilege escalation or remote code execution, the risk of kernel panics or system reboots can cause operational downtime and increased maintenance overhead. The impact is more pronounced in environments with automated device probing or frequent hardware changes. Given the lack of known exploits, the immediate threat level is moderate, but the potential for service disruption in critical infrastructure is significant for organizations dependent on affected hardware and kernel versions.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to versions where this vulnerability is resolved, ensuring that the qla2xxx driver no longer uses smp_processor_id() in preemptible contexts. Since no direct patch links are provided, organizations should track official Linux kernel security advisories and vendor-specific updates (e.g., Red Hat, SUSE, Canonical) for patched kernel releases. Additionally, organizations should audit their infrastructure to identify servers using QLogic Fibre Channel HBAs and verify kernel versions for vulnerability exposure. Implementing kernel crash monitoring and alerting can help detect early signs of instability related to this issue. For environments where immediate kernel updates are not feasible, temporarily disabling or limiting hot-plugging or device probing of QLogic HBAs during critical operations may reduce the risk of triggering the bug. Coordination with hardware vendors for firmware updates or driver alternatives could also be beneficial. Finally, thorough testing of kernel updates in staging environments before production deployment is recommended to ensure stability and compatibility.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T01:49:39.275Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe5097
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 3:27:49 AM
Last updated: 8/3/2025, 1:07:36 PM
Views: 14
Related Threats
CVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8451: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam Essential Addons for Elementor – Popular Elementor Templates & Widgets
MediumCVE-2025-8013: CWE-918 Server-Side Request Forgery (SSRF) in quttera Quttera Web Malware Scanner
LowCVE-2025-6679: CWE-434 Unrestricted Upload of File with Dangerous Type in bitpressadmin Bit Form – Custom Contact Form, Multi Step, Conversational, Payment & Quiz Form builder
CriticalCVE-2025-9013: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.