Skip to main content

CVE-2022-49157: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49157cvecve-2022-49157
Published: Wed Feb 26 2025 (02/26/2025, 01:55:20 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix premature hw access after PCI error After a recoverable PCI error has been detected and recovered, qla driver needs to check to see if the error condition still persist and/or wait for the OS to give the resume signal. Sep 8 22:26:03 localhost kernel: WARNING: CPU: 9 PID: 124606 at qla_tmpl.c:440 qla27xx_fwdt_entry_t266+0x55/0x60 [qla2xxx] Sep 8 22:26:03 localhost kernel: RIP: 0010:qla27xx_fwdt_entry_t266+0x55/0x60 [qla2xxx] Sep 8 22:26:03 localhost kernel: Call Trace: Sep 8 22:26:03 localhost kernel: ? qla27xx_walk_template+0xb1/0x1b0 [qla2xxx] Sep 8 22:26:03 localhost kernel: ? qla27xx_execute_fwdt_template+0x12a/0x160 [qla2xxx] Sep 8 22:26:03 localhost kernel: ? qla27xx_fwdump+0xa0/0x1c0 [qla2xxx] Sep 8 22:26:03 localhost kernel: ? qla2xxx_pci_mmio_enabled+0xfb/0x120 [qla2xxx] Sep 8 22:26:03 localhost kernel: ? report_mmio_enabled+0x44/0x80 Sep 8 22:26:03 localhost kernel: ? report_slot_reset+0x80/0x80 Sep 8 22:26:03 localhost kernel: ? pci_walk_bus+0x70/0x90 Sep 8 22:26:03 localhost kernel: ? aer_dev_correctable_show+0xc0/0xc0 Sep 8 22:26:03 localhost kernel: ? pcie_do_recovery+0x1bb/0x240 Sep 8 22:26:03 localhost kernel: ? aer_recover_work_func+0xaa/0xd0 Sep 8 22:26:03 localhost kernel: ? process_one_work+0x1a7/0x360 .. Sep 8 22:26:03 localhost kernel: qla2xxx [0000:42:00.2]-8041:22: detected PCI disconnect. Sep 8 22:26:03 localhost kernel: qla2xxx [0000:42:00.2]-107ff:22: qla27xx_fwdt_entry_t262: dump ram MB failed. Area 5h start 198013h end 198013h Sep 8 22:26:03 localhost kernel: qla2xxx [0000:42:00.2]-107ff:22: Unable to capture FW dump Sep 8 22:26:03 localhost kernel: qla2xxx [0000:42:00.2]-1015:22: cmd=0x0, waited 5221 msecs Sep 8 22:26:03 localhost kernel: qla2xxx [0000:42:00.2]-680d:22: mmio enabled returning. Sep 8 22:26:03 localhost kernel: qla2xxx [0000:42:00.2]-d04c:22: MBX Command timeout for cmd 0, iocontrol=ffffffff jiffies=10140f2e5 mb[0-3]=[0xffff 0xffff 0xffff 0xffff]

AI-Powered Analysis

AILast updated: 06/30/2025, 03:28:17 UTC

Technical Analysis

CVE-2022-49157 is a vulnerability identified in the Linux kernel's qla2xxx driver, which is responsible for managing QLogic Fibre Channel Host Bus Adapters (HBAs). The vulnerability arises from improper handling of recoverable PCI errors. Specifically, after a recoverable PCI error is detected and the system attempts recovery, the qla2xxx driver prematurely accesses hardware without verifying whether the error condition has been fully cleared or waiting for the operating system's resume signal. This premature hardware access can lead to kernel warnings, errors, and potentially unstable system behavior. The vulnerability manifests in kernel logs as warnings and errors related to firmware dump failures, mailbox command timeouts, and PCI disconnects, indicating that the driver attempts operations on hardware that may not be fully operational post-error recovery. The root cause is the driver's failure to properly synchronize with the PCI error recovery process, which can cause race conditions or invalid hardware accesses. While the vulnerability does not currently have known exploits in the wild, the underlying issue could lead to system instability, denial of service (DoS), or data corruption in environments relying on affected QLogic HBAs. The vulnerability affects specific Linux kernel versions identified by commit hashes, and a patch has been applied to ensure the driver checks for persistent error conditions and waits for OS resume signals before accessing hardware again.

Potential Impact

For European organizations, especially those operating data centers, cloud infrastructure, or enterprise storage solutions using Linux servers with QLogic Fibre Channel HBAs, this vulnerability poses a risk of system instability and potential denial of service. The premature hardware access after PCI error recovery could cause kernel panics or crashes, leading to downtime of critical services. In sectors such as finance, telecommunications, healthcare, and manufacturing, where high availability and data integrity are paramount, such disruptions could result in operational losses and impact service delivery. Additionally, if the vulnerability leads to data corruption on storage arrays connected via affected HBAs, it could compromise data integrity, causing further operational and compliance issues under regulations like GDPR. Although no active exploits are reported, the vulnerability's presence in the Linux kernel means that any organization using affected kernel versions and hardware is at risk until patched. The impact is heightened in environments with high PCI error rates or unstable hardware conditions, where the vulnerability could be triggered more frequently.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2022-49157. Since the vulnerability is in the qla2xxx driver, verifying the kernel version and driver updates is critical. System administrators should: 1) Audit their infrastructure to identify servers using QLogic Fibre Channel HBAs and confirm the kernel versions in use. 2) Apply vendor-provided kernel updates or patches that address this vulnerability promptly. 3) Monitor kernel logs for PCI error messages and qla2xxx driver warnings to detect potential issues early. 4) Implement robust hardware monitoring and maintenance to reduce PCI error occurrences, such as checking PCIe slot integrity and firmware updates for HBAs. 5) Consider isolating critical storage traffic or using redundant paths to mitigate the impact of potential DoS conditions caused by this vulnerability. 6) Test updates in staging environments to ensure stability before production deployment. 7) Engage with hardware vendors for firmware updates that may complement the kernel patch and improve PCI error handling.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.276Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe50a7

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 3:28:17 AM

Last updated: 8/15/2025, 11:45:49 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats