DEBIAN-CVE-2022-50744

Source
https://security-tracker.debian.org/tracker/CVE-2022-50744
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50744.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2022-50744
Upstream
Published
2025-12-24T13:16:01.120Z
Modified
2026-01-02T18:16:16.599576Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix hard lockup when reading the rxmonitor from debugfs During I/O and simultaneous cat of /sys/kernel/debug/lpfc/fnX/rxmonitor, a hard lockup similar to the call trace below may occur. The spinlockbh in lpfcrxmonitorreport is not protecting from timer interrupts as expected, so change the strength of the spin lock to _irq. Kernel panic - not syncing: Hard LOCKUP CPU: 3 PID: 110402 Comm: cat Kdump: loaded exception RIP: nativequeuedspinlockslowpath+91 [IRQ stack] nativequeuedspinlockslowpath at ffffffffb814e30b _rawspinlock at ffffffffb89a667a lpfcrxmonitorrecord at ffffffffc0a73a36 [lpfc] lpfccmftimer at ffffffffc0abbc67 [lpfc] _hrtimerrunqueues at ffffffffb8184250 hrtimerinterrupt at ffffffffb8184ab0 smpapictimerinterrupt at ffffffffb8a026ba apictimerinterrupt at ffffffffb8a01c4f [End of IRQ stack] apictimerinterrupt at ffffffffb8a01c4f lpfcrxmonitorreport at ffffffffc0a73c80 [lpfc] lpfcrxmonitorread at ffffffffc0addde1 [lpfc] fullproxyread at ffffffffb83e7fc3 vfsread at ffffffffb833fe71 ksysread at ffffffffb83402af dosyscall64 at ffffffffb800430b entrySYSCALL64after_hwframe at ffffffffb8a000ad

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50744.json"

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50744.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50744.json"