๐Ÿ” CVE Alert

CVE-2022-50744

UNKNOWN 0.0

scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs During I/O and simultaneous cat of /sys/kernel/debug/lpfc/fnX/rx_monitor, a hard lockup similar to the call trace below may occur. The spin_lock_bh in lpfc_rx_monitor_report is not protecting from timer interrupts as expected, so change the strength of the spin lock to _irq. Kernel panic - not syncing: Hard LOCKUP CPU: 3 PID: 110402 Comm: cat Kdump: loaded exception RIP: native_queued_spin_lock_slowpath+91 [IRQ stack] native_queued_spin_lock_slowpath at ffffffffb814e30b _raw_spin_lock at ffffffffb89a667a lpfc_rx_monitor_record at ffffffffc0a73a36 [lpfc] lpfc_cmf_timer at ffffffffc0abbc67 [lpfc] __hrtimer_run_queues at ffffffffb8184250 hrtimer_interrupt at ffffffffb8184ab0 smp_apic_timer_interrupt at ffffffffb8a026ba apic_timer_interrupt at ffffffffb8a01c4f [End of IRQ stack] apic_timer_interrupt at ffffffffb8a01c4f lpfc_rx_monitor_report at ffffffffc0a73c80 [lpfc] lpfc_rx_monitor_read at ffffffffc0addde1 [lpfc] full_proxy_read at ffffffffb83e7fc3 vfs_read at ffffffffb833fe71 ksys_read at ffffffffb83402af do_syscall_64 at ffffffffb800430b entry_SYSCALL_64_after_hwframe at ffffffffb8a000ad

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 24, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
21d65b35169112af9b6f873c8eeab972e60107c2 < 2cf66428a2545bb33beb9624124a2377468bb478 2c9b5b8326b953f2f48338a7c889e6af457d146f < cd542900ee5147028bbe603b238efcab8d720838 bd269188ea94e40ab002cad7b0df8f12b8f0de54 < 39761417ea7b654217d6d9085afbf7c87ba3675d bd269188ea94e40ab002cad7b0df8f12b8f0de54 < c44e50f4a0ec00c2298f31f91bc2c3e9bbd81c7e 147d397e08a406f5997f8a1c7f747fe546bf8395
Linux / Linux
6.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/2cf66428a2545bb33beb9624124a2377468bb478 git.kernel.org: https://git.kernel.org/stable/c/cd542900ee5147028bbe603b238efcab8d720838 git.kernel.org: https://git.kernel.org/stable/c/39761417ea7b654217d6d9085afbf7c87ba3675d git.kernel.org: https://git.kernel.org/stable/c/c44e50f4a0ec00c2298f31f91bc2c3e9bbd81c7e