In the Linux kernel, the following vulnerability has been resolved:
scsi: lpfc: Fix call trace observed during I/O with CMF enabled
The following was seen with CMF enabled:
BUG: using smp_processor_id() in preemptible
code: systemd-udevd/31711
kernel: caller is lpfc_update_cmf_cmd+0x214/0x420 [lpfc]
kernel: CPU: 12 PID: 31711 Comm: systemd-udevd
kernel: Call Trace:
kernel: <TASK>
kernel: dump_stack_lvl+0x44/0x57
kernel: check_preemption_disabled+0xbf/0xe0
kernel: lpfc_update_cmf_cmd+0x214/0x420 [lpfc]
kernel: lpfc_nvme_fcp_io_submit+0x23b4/0x4df0 [lpfc]
this_cpu_ptr() calls smp_processor_id() in a preemptible context.
Fix by using per_cpu_ptr() with raw_smp_processor_id() instead.
References
Configurations
Configuration 1 (hide)
|
History
21 Oct 2025, 12:05
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| First Time |
Linux
Linux linux Kernel |
|
| CWE | NVD-CWE-noinfo | |
| Summary |
|
|
| References | () https://git.kernel.org/stable/c/517e0835cfb2007713ff16c4fb8479f08b16aec7 - Patch | |
| References | () https://git.kernel.org/stable/c/ae373d66c427812754db5292eb1481b181daf9ce - Patch | |
| References | () https://git.kernel.org/stable/c/cd7f899de4b1b829125d72ee6fbfd878b637b815 - Patch | |
| References | () https://git.kernel.org/stable/c/d6d45f67a11136cb88a70a29ab22ea6db8ae6bd5 - Patch |
26 Feb 2025, 07:01
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-26 07:01
Updated : 2025-10-21 12:05
NVD link : CVE-2022-49537
Mitre link : CVE-2022-49537
CVE.ORG link : CVE-2022-49537
JSON object : View
Products Affected
linux
- linux_kernel
CWE
