{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T10:30:25.437","vulnerabilities":[{"cve":{"id":"CVE-2022-49157","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-02-26T07:00:52.917","lastModified":"2025-10-15T19:41:37.747","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix premature hw access after PCI error\n\nAfter a recoverable PCI error has been detected and recovered, qla driver\nneeds to check to see if the error condition still persist and/or wait\nfor the OS to give the resume signal.\n\nSep  8 22:26:03 localhost kernel: WARNING: CPU: 9 PID: 124606 at qla_tmpl.c:440\nqla27xx_fwdt_entry_t266+0x55/0x60 [qla2xxx]\nSep  8 22:26:03 localhost kernel: RIP: 0010:qla27xx_fwdt_entry_t266+0x55/0x60\n[qla2xxx]\nSep  8 22:26:03 localhost kernel: Call Trace:\nSep  8 22:26:03 localhost kernel: ? qla27xx_walk_template+0xb1/0x1b0 [qla2xxx]\nSep  8 22:26:03 localhost kernel: ? qla27xx_execute_fwdt_template+0x12a/0x160\n[qla2xxx]\nSep  8 22:26:03 localhost kernel: ? qla27xx_fwdump+0xa0/0x1c0 [qla2xxx]\nSep  8 22:26:03 localhost kernel: ? qla2xxx_pci_mmio_enabled+0xfb/0x120\n[qla2xxx]\nSep  8 22:26:03 localhost kernel: ? report_mmio_enabled+0x44/0x80\nSep  8 22:26:03 localhost kernel: ? report_slot_reset+0x80/0x80\nSep  8 22:26:03 localhost kernel: ? pci_walk_bus+0x70/0x90\nSep  8 22:26:03 localhost kernel: ? aer_dev_correctable_show+0xc0/0xc0\nSep  8 22:26:03 localhost kernel: ? pcie_do_recovery+0x1bb/0x240\nSep  8 22:26:03 localhost kernel: ? aer_recover_work_func+0xaa/0xd0\nSep  8 22:26:03 localhost kernel: ? process_one_work+0x1a7/0x360\n..\nSep  8 22:26:03 localhost kernel: qla2xxx [0000:42:00.2]-8041:22: detected PCI\ndisconnect.\nSep  8 22:26:03 localhost kernel: qla2xxx [0000:42:00.2]-107ff:22:\nqla27xx_fwdt_entry_t262: dump ram MB failed. Area 5h start 198013h end 198013h\nSep  8 22:26:03 localhost kernel: qla2xxx [0000:42:00.2]-107ff:22: Unable to\ncapture FW dump\nSep  8 22:26:03 localhost kernel: qla2xxx [0000:42:00.2]-1015:22: cmd=0x0,\nwaited 5221 msecs\nSep  8 22:26:03 localhost kernel: qla2xxx [0000:42:00.2]-680d:22: mmio\nenabled returning.\nSep  8 22:26:03 localhost kernel: qla2xxx [0000:42:00.2]-d04c:22: MBX\nCommand timeout for cmd 0, iocontrol=ffffffff jiffies=10140f2e5\nmb[0-3]=[0xffff 0xffff 0xffff 0xffff]"},{"lang":"es","value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: qla2xxx: Reparar acceso prematuro a hardware después de un error PCI Después de que se haya detectado y recuperado un error PCI recuperable, el controlador qla necesita verificar si la condición de error aún persiste y/o esperar a que el SO dé la señal de reanudación. 8 sep 22:26:03 kernel localhost: ADVERTENCIA: CPU: 9 PID: 124606 en qla_tmpl.c:440 qla27xx_fwdt_entry_t266+0x55/0x60 [qla2xxx] 8 sep 22:26:03 kernel localhost: RIP: 0010:qla27xx_fwdt_entry_t266+0x55/0x60 [qla2xxx] 8 sep 22:26:03 kernel localhost: Rastreo de llamada: 8 sep 22:26:03 kernel localhost: ? qla27xx_walk_template+0xb1/0x1b0 [qla2xxx] 8 sep 22:26:03 núcleo localhost: ? qla27xx_execute_fwdt_template+0x12a/0x160 [qla2xxx] 8 sep 22:26:03 núcleo localhost: ? qla27xx_fwdump+0xa0/0x1c0 [qla2xxx] 8 sep 22:26:03 núcleo localhost: ? qla2xxx_pci_mmio_enabled+0xfb/0x120 [qla2xxx] 8 sep 22:26:03 núcleo localhost: ? report_mmio_enabled+0x44/0x80 8 sep 22:26:03 núcleo localhost: ? report_slot_reset+0x80/0x80 8 sep 22:26:03 kernel localhost: ? pci_walk_bus+0x70/0x90 8 sep 22:26:03 kernel localhost: ? aer_dev_correctable_show+0xc0/0xc0 8 sep 22:26:03 kernel localhost: ? pcie_do_recovery+0x1bb/0x240 8 sep 22:26:03 kernel localhost: ? aer_recover_work_func+0xaa/0xd0 8 sep 22:26:03 kernel localhost: ? process_one_work+0x1a7/0x360 .. 8 sep 22:26:03 kernel localhost: qla2xxx [0000:42:00.2]-8041:22: se detectó una desconexión de PCI. 8 sep 22:26:03 kernel localhost: qla2xxx [0000:42:00.2]-107ff:22: qla27xx_fwdt_entry_t262: se produjo un error al volcar la memoria RAM de la placa base. Área 5h inicio 198013h fin 198013h 8 sep 22:26:03 kernel localhost: qla2xxx [0000:42:00.2]-107ff:22: No se puede capturar el volcado de FW 8 sep 22:26:03 kernel localhost: qla2xxx [0000:42:00.2]-1015:22: cmd=0x0, esperó 5221 msecs 8 sep 22:26:03 kernel localhost: qla2xxx [0000:42:00.2]-680d:22: mmio habilitado regresando. 8 de septiembre 22:26:03 kernel localhost: qla2xxx [0000:42:00.2]-d04c:22: Tiempo de espera del comando MBX para cmd 0, iocontrol=ffffffff jiffies=10140f2e5 mb[0-3]=[0xffff 0xffff 0xffff 0xffff]"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.15.33","matchCriteriaId":"0B4D5502-DA34-43DA-93D1-158E3047C2C7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"5.16.19","matchCriteriaId":"20C43679-0439-405A-B97F-685BEE50613B"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.17","versionEndExcluding":"5.17.2","matchCriteriaId":"210C679C-CF84-44A3-8939-E629C87E54BF"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/5ef6319f9882699613d5182fbd7929b017e8c5ab","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/6c125fd5ad035777f7b471553f7ddda76e8e7136","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/d7994dff9071555a959a168f9184dd9abae68a6b","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/e35920ab7874d5e2faeb4f958a74bfa793f1ce5a","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]}]}}]}