CVE-2022-50744

Source
https://cve.org/CVERecord?id=CVE-2022-50744
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50744.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50744
Downstream
Related
Published
2025-12-24T13:05:41.138Z
Modified
2026-03-20T12:22:37.575633Z
Summary
scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs

During I/O and simultaneous cat of /sys/kernel/debug/lpfc/fnX/rx_monitor, a hard lockup similar to the call trace below may occur.

The spinlockbh in lpfcrxmonitor_report is not protecting from timer interrupts as expected, so change the strength of the spin lock to _irq.

Kernel panic - not syncing: Hard LOCKUP CPU: 3 PID: 110402 Comm: cat Kdump: loaded

exception RIP: nativequeuedspinlockslowpath+91

[IRQ stack] nativequeuedspinlockslowpath at ffffffffb814e30b rawspinlock at ffffffffb89a667a lpfcrxmonitorrecord at ffffffffc0a73a36 [lpfc] lpfccmftimer at ffffffffc0abbc67 [lpfc] __hrtimerrunqueues at ffffffffb8184250 hrtimerinterrupt at ffffffffb8184ab0 smpapictimerinterrupt at ffffffffb8a026ba apictimerinterrupt at ffffffffb8a01c4f [End of IRQ stack]

apictimerinterrupt at ffffffffb8a01c4f lpfcrxmonitorreport at ffffffffc0a73c80 [lpfc] lpfcrxmonitorread at ffffffffc0addde1 [lpfc] fullproxyread at ffffffffb83e7fc3 vfsread at ffffffffb833fe71 ksysread at ffffffffb83402af dosyscall64 at ffffffffb800430b entrySYSCALL64afterhwframe at ffffffffb8a000ad

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50744.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
21d65b35169112af9b6f873c8eeab972e60107c2
Fixed
2cf66428a2545bb33beb9624124a2377468bb478
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2c9b5b8326b953f2f48338a7c889e6af457d146f
Fixed
cd542900ee5147028bbe603b238efcab8d720838
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bd269188ea94e40ab002cad7b0df8f12b8f0de54
Fixed
39761417ea7b654217d6d9085afbf7c87ba3675d
Fixed
c44e50f4a0ec00c2298f31f91bc2c3e9bbd81c7e
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
147d397e08a406f5997f8a1c7f747fe546bf8395

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50744.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.86
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.16
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50744.json"