๐Ÿ” CVE Alert

CVE-2022-49537

UNKNOWN 0.0

scsi: lpfc: Fix call trace observed during I/O with CMF enabled

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix call trace observed during I/O with CMF enabled The following was seen with CMF enabled: BUG: using smp_processor_id() in preemptible code: systemd-udevd/31711 kernel: caller is lpfc_update_cmf_cmd+0x214/0x420 [lpfc] kernel: CPU: 12 PID: 31711 Comm: systemd-udevd kernel: Call Trace: kernel: <TASK> kernel: dump_stack_lvl+0x44/0x57 kernel: check_preemption_disabled+0xbf/0xe0 kernel: lpfc_update_cmf_cmd+0x214/0x420 [lpfc] kernel: lpfc_nvme_fcp_io_submit+0x23b4/0x4df0 [lpfc] this_cpu_ptr() calls smp_processor_id() in a preemptible context. Fix by using per_cpu_ptr() with raw_smp_processor_id() instead.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 26, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
02243836ad6f384284f10302e6b820b893960d1c < ae373d66c427812754db5292eb1481b181daf9ce 02243836ad6f384284f10302e6b820b893960d1c < cd7f899de4b1b829125d72ee6fbfd878b637b815 02243836ad6f384284f10302e6b820b893960d1c < 517e0835cfb2007713ff16c4fb8479f08b16aec7 02243836ad6f384284f10302e6b820b893960d1c < d6d45f67a11136cb88a70a29ab22ea6db8ae6bd5
Linux / Linux
5.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/ae373d66c427812754db5292eb1481b181daf9ce git.kernel.org: https://git.kernel.org/stable/c/cd7f899de4b1b829125d72ee6fbfd878b637b815 git.kernel.org: https://git.kernel.org/stable/c/517e0835cfb2007713ff16c4fb8479f08b16aec7 git.kernel.org: https://git.kernel.org/stable/c/d6d45f67a11136cb88a70a29ab22ea6db8ae6bd5