CVE-2022-49537

Source
https://cve.org/CVERecord?id=CVE-2022-49537
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49537.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49537
Downstream
Related
Published
2025-02-26T02:13:54.542Z
Modified
2026-03-20T12:24:38.589831Z
Summary
scsi: lpfc: Fix call trace observed during I/O with CMF enabled
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix call trace observed during I/O with CMF enabled

The following was seen with CMF enabled:

BUG: using smpprocessorid() in preemptible code: systemd-udevd/31711 kernel: caller is lpfcupdatecmfcmd+0x214/0x420 [lpfc] kernel: CPU: 12 PID: 31711 Comm: systemd-udevd kernel: Call Trace: kernel: <TASK> kernel: dumpstacklvl+0x44/0x57 kernel: checkpreemptiondisabled+0xbf/0xe0 kernel: lpfcupdatecmfcmd+0x214/0x420 [lpfc] kernel: lpfcnvmefcpiosubmit+0x23b4/0x4df0 [lpfc]

thiscpuptr() calls smpprocessorid() in a preemptible context.

Fix by using percpuptr() with rawsmpprocessor_id() instead.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49537.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
02243836ad6f384284f10302e6b820b893960d1c
Fixed
ae373d66c427812754db5292eb1481b181daf9ce
Fixed
cd7f899de4b1b829125d72ee6fbfd878b637b815
Fixed
517e0835cfb2007713ff16c4fb8479f08b16aec7
Fixed
d6d45f67a11136cb88a70a29ab22ea6db8ae6bd5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49537.json"