Skip to main content

CVE-2022-49156: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49156cvecve-2022-49156
Published: Wed Feb 26 2025 (02/26/2025, 01:55:20 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix scheduling while atomic The driver makes a call into midlayer (fc_remote_port_delete) which can put the thread to sleep. The thread that originates the call is in interrupt context. The combination of the two trigger a crash. Schedule the call in non-interrupt context where it is more safe. kernel: BUG: scheduling while atomic: swapper/7/0/0x00010000 kernel: Call Trace: kernel: <IRQ> kernel: dump_stack+0x66/0x81 kernel: __schedule_bug.cold.90+0x5/0x1d kernel: __schedule+0x7af/0x960 kernel: schedule+0x28/0x80 kernel: schedule_timeout+0x26d/0x3b0 kernel: wait_for_completion+0xb4/0x140 kernel: ? wake_up_q+0x70/0x70 kernel: __wait_rcu_gp+0x12c/0x160 kernel: ? sdev_evt_alloc+0xc0/0x180 [scsi_mod] kernel: synchronize_sched+0x6c/0x80 kernel: ? call_rcu_bh+0x20/0x20 kernel: ? __bpf_trace_rcu_invoke_callback+0x10/0x10 kernel: sdev_evt_alloc+0xfd/0x180 [scsi_mod] kernel: starget_for_each_device+0x85/0xb0 [scsi_mod] kernel: ? scsi_init_io+0x360/0x3d0 [scsi_mod] kernel: scsi_init_io+0x388/0x3d0 [scsi_mod] kernel: device_for_each_child+0x54/0x90 kernel: fc_remote_port_delete+0x70/0xe0 [scsi_transport_fc] kernel: qla2x00_schedule_rport_del+0x62/0xf0 [qla2xxx] kernel: qla2x00_mark_device_lost+0x9c/0xd0 [qla2xxx] kernel: qla24xx_handle_plogi_done_event+0x55f/0x570 [qla2xxx] kernel: qla2x00_async_login_sp_done+0xd2/0x100 [qla2xxx] kernel: qla24xx_logio_entry+0x13a/0x3c0 [qla2xxx] kernel: qla24xx_process_response_queue+0x306/0x400 [qla2xxx] kernel: qla24xx_msix_rsp_q+0x3f/0xb0 [qla2xxx] kernel: __handle_irq_event_percpu+0x40/0x180 kernel: handle_irq_event_percpu+0x30/0x80 kernel: handle_irq_event+0x36/0x60

AI-Powered Analysis

AILast updated: 06/30/2025, 03:28:04 UTC

Technical Analysis

CVE-2022-49156 is a vulnerability identified in the Linux kernel's qla2xxx SCSI driver, which handles certain Fibre Channel host bus adapters. The flaw arises from improper scheduling behavior in interrupt context. Specifically, the driver calls the midlayer function fc_remote_port_delete, which can cause the thread to sleep. However, this call originates from an interrupt context where sleeping is disallowed. This mismatch triggers a kernel crash due to the kernel attempting to schedule while in atomic context, violating kernel scheduling rules. The crash manifests as a BUG message indicating "scheduling while atomic" and results in a kernel panic or system halt. The root cause is that the driver attempts to perform operations that may block (sleep) while in an atomic context where blocking is forbidden. The fix involves deferring the problematic call to a non-interrupt context, ensuring that sleeping operations occur safely. The vulnerability affects Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and similar. There are no known exploits in the wild at this time, and no CVSS score has been assigned. The issue is significant because it can cause denial of service (DoS) through kernel crashes on systems using the affected qla2xxx driver, which is common in enterprise environments relying on Fibre Channel storage networks. The vulnerability does not appear to allow privilege escalation or code execution but impacts system availability and stability.

Potential Impact

For European organizations, the primary impact of CVE-2022-49156 is potential denial of service due to kernel crashes on Linux systems using the qla2xxx driver for Fibre Channel storage connectivity. This can disrupt critical storage access, leading to application downtime, data unavailability, and operational interruptions. Organizations with data centers, cloud infrastructure, or enterprise storage solutions that rely on affected Linux kernels and QLogic Fibre Channel adapters are at risk. The impact is particularly relevant for sectors with high availability requirements such as finance, healthcare, telecommunications, and manufacturing. While no data breach or privilege escalation is indicated, repeated crashes could lead to system instability and increased operational costs due to downtime and recovery efforts. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or triggered crashes. Given the widespread use of Linux in European IT infrastructure, especially in server and storage environments, the vulnerability could affect a broad range of organizations if not addressed promptly.

Mitigation Recommendations

To mitigate CVE-2022-49156, European organizations should: 1) Identify Linux systems using the qla2xxx driver, particularly those interfacing with Fibre Channel storage. 2) Apply the official Linux kernel patches that fix the scheduling while atomic issue as soon as they become available from trusted sources or Linux distributions. 3) If immediate patching is not possible, consider temporarily disabling or replacing the qla2xxx driver with alternative drivers or storage connectivity methods where feasible. 4) Monitor kernel logs for signs of "scheduling while atomic" errors or unexpected kernel panics related to the qla2xxx driver to detect potential exploitation or accidental triggering. 5) Implement robust backup and recovery procedures to minimize downtime impact in case of crashes. 6) Coordinate with hardware vendors and Linux distribution maintainers to ensure timely updates and support. 7) Limit access to systems with the vulnerable driver to trusted administrators to reduce risk of accidental triggering. These steps go beyond generic advice by focusing on driver-specific identification, proactive monitoring, and contingency planning tailored to the affected component and its operational context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.275Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe509f

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 3:28:04 AM

Last updated: 7/31/2025, 3:40:12 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats