5.5
MEDIUM CVSS 3.1
CVE-2022-48758
scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()
Description

In the Linux kernel, the following vulnerability has been resolved: scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() The bnx2fc_destroy() functions are removing the interface before calling destroy_work. This results multiple WARNings from sysfs_remove_group() as the controller rport device attributes are removed too early. Replace the fcoe_port's destroy_work queue. It's not needed. The problem is easily reproducible with the following steps. Example: $ dmesg -w & $ systemctl enable --now fcoe $ fipvlan -s -c ens2f1 $ fcoeadm -d ens2f1.802 [ 583.464488] host2: libfc: Link down on port (7500a1) [ 583.472651] bnx2fc: 7500a1 - rport not created Yet!! [ 583.490468] ------------[ cut here ]------------ [ 583.538725] sysfs group 'power' not found for kobject 'rport-2:0-0' [ 583.568814] WARNING: CPU: 3 PID: 192 at fs/sysfs/group.c:279 sysfs_remove_group+0x6f/0x80 [ 583.607130] Modules linked in: dm_service_time 8021q garp mrp stp llc bnx2fc cnic uio rpcsec_gss_krb5 auth_rpcgss nfsv4 ... [ 583.942994] CPU: 3 PID: 192 Comm: kworker/3:2 Kdump: loaded Not tainted 5.14.0-39.el9.x86_64 #1 [ 583.984105] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013 [ 584.016535] Workqueue: fc_wq_2 fc_rport_final_delete [scsi_transport_fc] [ 584.050691] RIP: 0010:sysfs_remove_group+0x6f/0x80 [ 584.074725] Code: ff 5b 48 89 ef 5d 41 5c e9 ee c0 ff ff 48 89 ef e8 f6 b8 ff ff eb d1 49 8b 14 24 48 8b 33 48 c7 c7 ... [ 584.162586] RSP: 0018:ffffb567c15afdc0 EFLAGS: 00010282 [ 584.188225] RAX: 0000000000000000 RBX: ffffffff8eec4220 RCX: 0000000000000000 [ 584.221053] RDX: ffff8c1586ce84c0 RSI: ffff8c1586cd7cc0 RDI: ffff8c1586cd7cc0 [ 584.255089] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffb567c15afc00 [ 584.287954] R10: ffffb567c15afbf8 R11: ffffffff8fbe7f28 R12: ffff8c1486326400 [ 584.322356] R13: ffff8c1486326480 R14: ffff8c1483a4a000 R15: 0000000000000004 [ 584.355379] FS: 0000000000000000(0000) GS:ffff8c1586cc0000(0000) knlGS:0000000000000000 [ 584.394419] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 584.421123] CR2: 00007fe95a6f7840 CR3: 0000000107674002 CR4: 00000000000606e0 [ 584.454888] Call Trace: [ 584.466108] device_del+0xb2/0x3e0 [ 584.481701] device_unregister+0x13/0x60 [ 584.501306] bsg_unregister_queue+0x5b/0x80 [ 584.522029] bsg_remove_queue+0x1c/0x40 [ 584.541884] fc_rport_final_delete+0xf3/0x1d0 [scsi_transport_fc] [ 584.573823] process_one_work+0x1e3/0x3b0 [ 584.592396] worker_thread+0x50/0x3b0 [ 584.609256] ? rescuer_thread+0x370/0x370 [ 584.628877] kthread+0x149/0x170 [ 584.643673] ? set_kthread_struct+0x40/0x40 [ 584.662909] ret_from_fork+0x22/0x30 [ 584.680002] ---[ end trace 53575ecefa942ece ]---

INFO

Published Date :

June 20, 2024, 12:15 p.m.

Last Modified :

Sept. 29, 2025, 5:23 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2022-48758 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 MEDIUM [email protected]
Solution
This addresses a SCSI vulnerability by updating kernel packages.
  • Update the affected kernel packages to resolve the vulnerability.
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2022-48758.

URL Resource
https://git.kernel.org/stable/c/00849de10f798a9538242824a51b1756e7110754 Patch
https://git.kernel.org/stable/c/262550f29c750f7876b6ed1244281e72b64ebffb Patch
https://git.kernel.org/stable/c/2a12fe8248a38437b95b942bbe85aced72e6e2eb Patch
https://git.kernel.org/stable/c/847f9ea4c5186fdb7b84297e3eeed9e340e83fce Patch
https://git.kernel.org/stable/c/ace7b6ef41251c5fe47f629a9a922382fb7b0a6b Patch
https://git.kernel.org/stable/c/b11e34f7bab21df36f02a5e54fb69e858c09a65d Patch
https://git.kernel.org/stable/c/bf2bd892a0cb14dd2d21f2c658f4b747813be311 Patch
https://git.kernel.org/stable/c/c93a290c862ccfa404e42d7420565730d67cbff9 Patch
https://git.kernel.org/stable/c/de6336b17a1376db1c0f7a528cce8783db0881c0 Patch
https://git.kernel.org/stable/c/00849de10f798a9538242824a51b1756e7110754 Patch
https://git.kernel.org/stable/c/262550f29c750f7876b6ed1244281e72b64ebffb Patch
https://git.kernel.org/stable/c/2a12fe8248a38437b95b942bbe85aced72e6e2eb Patch
https://git.kernel.org/stable/c/847f9ea4c5186fdb7b84297e3eeed9e340e83fce Patch
https://git.kernel.org/stable/c/ace7b6ef41251c5fe47f629a9a922382fb7b0a6b Patch
https://git.kernel.org/stable/c/b11e34f7bab21df36f02a5e54fb69e858c09a65d Patch
https://git.kernel.org/stable/c/bf2bd892a0cb14dd2d21f2c658f4b747813be311 Patch
https://git.kernel.org/stable/c/c93a290c862ccfa404e42d7420565730d67cbff9 Patch
https://git.kernel.org/stable/c/de6336b17a1376db1c0f7a528cce8783db0881c0 Patch
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-48758 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-48758 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-48758 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-48758 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Sep. 29, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
    Added CWE NVD-CWE-noinfo
    Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.19 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 5.16.5 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.15 up to (excluding) 4.19.228 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.10 up to (excluding) 4.14.265 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.96 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 3.2 up to (excluding) 4.4.302 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.5 up to (excluding) 4.9.300 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.176
    Added Reference Type CVE: https://git.kernel.org/stable/c/00849de10f798a9538242824a51b1756e7110754 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/00849de10f798a9538242824a51b1756e7110754 Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/262550f29c750f7876b6ed1244281e72b64ebffb Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/262550f29c750f7876b6ed1244281e72b64ebffb Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/2a12fe8248a38437b95b942bbe85aced72e6e2eb Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/2a12fe8248a38437b95b942bbe85aced72e6e2eb Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/847f9ea4c5186fdb7b84297e3eeed9e340e83fce Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/847f9ea4c5186fdb7b84297e3eeed9e340e83fce Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/ace7b6ef41251c5fe47f629a9a922382fb7b0a6b Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/ace7b6ef41251c5fe47f629a9a922382fb7b0a6b Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/b11e34f7bab21df36f02a5e54fb69e858c09a65d Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/b11e34f7bab21df36f02a5e54fb69e858c09a65d Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/bf2bd892a0cb14dd2d21f2c658f4b747813be311 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/bf2bd892a0cb14dd2d21f2c658f4b747813be311 Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/c93a290c862ccfa404e42d7420565730d67cbff9 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/c93a290c862ccfa404e42d7420565730d67cbff9 Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/de6336b17a1376db1c0f7a528cce8783db0881c0 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/de6336b17a1376db1c0f7a528cce8783db0881c0 Types: Patch
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://git.kernel.org/stable/c/00849de10f798a9538242824a51b1756e7110754
    Added Reference https://git.kernel.org/stable/c/262550f29c750f7876b6ed1244281e72b64ebffb
    Added Reference https://git.kernel.org/stable/c/2a12fe8248a38437b95b942bbe85aced72e6e2eb
    Added Reference https://git.kernel.org/stable/c/847f9ea4c5186fdb7b84297e3eeed9e340e83fce
    Added Reference https://git.kernel.org/stable/c/ace7b6ef41251c5fe47f629a9a922382fb7b0a6b
    Added Reference https://git.kernel.org/stable/c/b11e34f7bab21df36f02a5e54fb69e858c09a65d
    Added Reference https://git.kernel.org/stable/c/bf2bd892a0cb14dd2d21f2c658f4b747813be311
    Added Reference https://git.kernel.org/stable/c/c93a290c862ccfa404e42d7420565730d67cbff9
    Added Reference https://git.kernel.org/stable/c/de6336b17a1376db1c0f7a528cce8783db0881c0
  • CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Jun. 20, 2024

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() The bnx2fc_destroy() functions are removing the interface before calling destroy_work. This results multiple WARNings from sysfs_remove_group() as the controller rport device attributes are removed too early. Replace the fcoe_port's destroy_work queue. It's not needed. The problem is easily reproducible with the following steps. Example: $ dmesg -w & $ systemctl enable --now fcoe $ fipvlan -s -c ens2f1 $ fcoeadm -d ens2f1.802 [ 583.464488] host2: libfc: Link down on port (7500a1) [ 583.472651] bnx2fc: 7500a1 - rport not created Yet!! [ 583.490468] ------------[ cut here ]------------ [ 583.538725] sysfs group 'power' not found for kobject 'rport-2:0-0' [ 583.568814] WARNING: CPU: 3 PID: 192 at fs/sysfs/group.c:279 sysfs_remove_group+0x6f/0x80 [ 583.607130] Modules linked in: dm_service_time 8021q garp mrp stp llc bnx2fc cnic uio rpcsec_gss_krb5 auth_rpcgss nfsv4 ... [ 583.942994] CPU: 3 PID: 192 Comm: kworker/3:2 Kdump: loaded Not tainted 5.14.0-39.el9.x86_64 #1 [ 583.984105] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013 [ 584.016535] Workqueue: fc_wq_2 fc_rport_final_delete [scsi_transport_fc] [ 584.050691] RIP: 0010:sysfs_remove_group+0x6f/0x80 [ 584.074725] Code: ff 5b 48 89 ef 5d 41 5c e9 ee c0 ff ff 48 89 ef e8 f6 b8 ff ff eb d1 49 8b 14 24 48 8b 33 48 c7 c7 ... [ 584.162586] RSP: 0018:ffffb567c15afdc0 EFLAGS: 00010282 [ 584.188225] RAX: 0000000000000000 RBX: ffffffff8eec4220 RCX: 0000000000000000 [ 584.221053] RDX: ffff8c1586ce84c0 RSI: ffff8c1586cd7cc0 RDI: ffff8c1586cd7cc0 [ 584.255089] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffb567c15afc00 [ 584.287954] R10: ffffb567c15afbf8 R11: ffffffff8fbe7f28 R12: ffff8c1486326400 [ 584.322356] R13: ffff8c1486326480 R14: ffff8c1483a4a000 R15: 0000000000000004 [ 584.355379] FS: 0000000000000000(0000) GS:ffff8c1586cc0000(0000) knlGS:0000000000000000 [ 584.394419] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 584.421123] CR2: 00007fe95a6f7840 CR3: 0000000107674002 CR4: 00000000000606e0 [ 584.454888] Call Trace: [ 584.466108] device_del+0xb2/0x3e0 [ 584.481701] device_unregister+0x13/0x60 [ 584.501306] bsg_unregister_queue+0x5b/0x80 [ 584.522029] bsg_remove_queue+0x1c/0x40 [ 584.541884] fc_rport_final_delete+0xf3/0x1d0 [scsi_transport_fc] [ 584.573823] process_one_work+0x1e3/0x3b0 [ 584.592396] worker_thread+0x50/0x3b0 [ 584.609256] ? rescuer_thread+0x370/0x370 [ 584.628877] kthread+0x149/0x170 [ 584.643673] ? set_kthread_struct+0x40/0x40 [ 584.662909] ret_from_fork+0x22/0x30 [ 584.680002] ---[ end trace 53575ecefa942ece ]---
    Added Reference kernel.org https://git.kernel.org/stable/c/2a12fe8248a38437b95b942bbe85aced72e6e2eb [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/262550f29c750f7876b6ed1244281e72b64ebffb [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/c93a290c862ccfa404e42d7420565730d67cbff9 [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/de6336b17a1376db1c0f7a528cce8783db0881c0 [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/bf2bd892a0cb14dd2d21f2c658f4b747813be311 [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/00849de10f798a9538242824a51b1756e7110754 [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/b11e34f7bab21df36f02a5e54fb69e858c09a65d [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/ace7b6ef41251c5fe47f629a9a922382fb7b0a6b [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/847f9ea4c5186fdb7b84297e3eeed9e340e83fce [No types assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 5.5
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact