-

CVE-2022-50098

In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts

Ensure SRB is returned during I/O timeout error escalation. If that is not
possible fail the escalation path.

Following crash stack was seen:

BUG: unable to handle kernel paging request at 0000002f56aa90f8
IP: qla_chk_edif_rx_sa_delete_pending+0x14/0x30 [qla2xxx]
Call Trace:
 ? qla2x00_status_entry+0x19f/0x1c50 [qla2xxx]
 ? qla2x00_start_sp+0x116/0x1170 [qla2xxx]
 ? dma_pool_alloc+0x1d6/0x210
 ? mempool_alloc+0x54/0x130
 ? qla24xx_process_response_queue+0x548/0x12b0 [qla2xxx]
 ? qla_do_work+0x2d/0x40 [qla2xxx]
 ? process_one_work+0x14c/0x390

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < b7bae3886a30d258b5b4fee26647043d68da3661
Version d74595278f4ab192af66d9e60a9087464638beee
Status affected
Version < b70553175d0f94ebd73670bc16ade90bd7f7d76f
Version d74595278f4ab192af66d9e60a9087464638beee
Status affected
Version < 7dcd49c42b14717dd668fd73b503d241fdf82439
Version d74595278f4ab192af66d9e60a9087464638beee
Status affected
Version < c39587bc0abaf16593f7abcdf8aeec3c038c7d52
Version d74595278f4ab192af66d9e60a9087464638beee
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 4.10
Status affected
Version < 4.10
Version 0
Status unaffected
Version <= 5.15.*
Version 5.15.61
Status unaffected
Version <= 5.18.*
Version 5.18.18
Status unaffected
Version <= 5.19.*
Version 5.19.2
Status unaffected
Version <= *
Version 6.0
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.056
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string