CVE-2024-42124

Source
https://cve.org/CVERecord?id=CVE-2024-42124
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42124.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-42124
Downstream
Related
Published
2024-07-30T07:46:16.052Z
Modified
2026-03-20T12:38:42.418892Z
Summary
scsi: qedf: Make qedf_execute_tmf() non-preemptible
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Make qedfexecutetmf() non-preemptible

Stop calling smpprocessorid() from preemptible code in qedfexecutetmf90. This results in BUG_ON() when running an RT kernel.

[ 659.343280] BUG: using smpprocessorid() in preemptible [00000000] code: sgreset/3646 [ 659.343282] caller is qedfexecute_tmf+0x8b/0x360 [qedf]

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42124.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
61d8658b4a435eac729966cc94cdda077a8df5cd
Fixed
4f314aadeed8cdf42c8cf30769425b5e44702748
Fixed
5ceb40cdee721e13cbe15a0515cacf984e11236b
Fixed
0a8a91932b2772e75bf3f6d133ca4225d1d3e920
Fixed
fa49c65a1cec6a3901ef884fdb24d98068b63493
Fixed
b6ded5316ec56e973dcf5f9997945aad01a9f062
Fixed
2b9c7787cfcd1e76d873a78f16cf45bfa4b100ea
Fixed
0d8b637c9c5eeaa1a4e3dfb336f3ff918eb64fec

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42124.json"