CVE-2022-49537: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix call trace observed during I/O with CMF enabled The following was seen with CMF enabled: BUG: using smp_processor_id() in preemptible code: systemd-udevd/31711 kernel: caller is lpfc_update_cmf_cmd+0x214/0x420 [lpfc] kernel: CPU: 12 PID: 31711 Comm: systemd-udevd kernel: Call Trace: kernel: <TASK> kernel: dump_stack_lvl+0x44/0x57 kernel: check_preemption_disabled+0xbf/0xe0 kernel: lpfc_update_cmf_cmd+0x214/0x420 [lpfc] kernel: lpfc_nvme_fcp_io_submit+0x23b4/0x4df0 [lpfc] this_cpu_ptr() calls smp_processor_id() in a preemptible context. Fix by using per_cpu_ptr() with raw_smp_processor_id() instead.
AI Analysis
Technical Summary
CVE-2022-49537 is a vulnerability identified in the Linux kernel, specifically within the lpfc (LightPulse Fibre Channel) driver component. The issue arises when the driver operates with CMF (Command Management Facility) enabled. The vulnerability is related to improper use of CPU identification functions in a preemptible context. Specifically, the function this_cpu_ptr() internally calls smp_processor_id(), which is not safe to use in preemptible code paths. This misuse leads to a kernel BUG triggered during I/O operations, as observed in the systemd-udevd process. The root cause is that smp_processor_id() assumes preemption is disabled, but in this case, it was called in a preemptible context, causing instability. The fix involves replacing this_cpu_ptr() with per_cpu_ptr() combined with raw_smp_processor_id(), which safely retrieves per-CPU data without relying on preemption-disabled assumptions. This correction prevents kernel call traces and potential crashes during I/O operations involving the lpfc driver with CMF enabled. Although no known exploits are reported in the wild, the vulnerability can cause system instability or denial of service due to kernel panics or crashes triggered by the improper CPU ID usage in the driver code.
Potential Impact
For European organizations relying on Linux servers that utilize Fibre Channel storage with the lpfc driver and have CMF enabled, this vulnerability could lead to unexpected kernel crashes or system instability. Such disruptions can affect critical infrastructure, data centers, and enterprise storage environments, potentially causing downtime and impacting availability of services. While the vulnerability does not directly allow remote code execution or privilege escalation, the resulting kernel panics could lead to denial of service conditions. Organizations with high availability requirements, such as financial institutions, healthcare providers, and cloud service operators in Europe, may face operational risks if their Linux kernel versions are affected and not patched. The impact is primarily on system reliability and availability rather than confidentiality or integrity.
Mitigation Recommendations
European organizations should promptly identify Linux systems running the affected lpfc driver with CMF enabled. They should apply the vendor-provided patches or kernel updates that replace the unsafe CPU ID calls with safe alternatives (per_cpu_ptr() and raw_smp_processor_id()). In environments where immediate patching is not feasible, temporarily disabling CMF functionality in the lpfc driver could mitigate the risk of kernel crashes. Additionally, organizations should monitor system logs for kernel call traces or BUG messages related to lpfc and systemd-udevd processes as indicators of this issue. Implementing robust kernel crash recovery and system monitoring will help minimize downtime. Testing patches in staging environments before deployment is recommended to ensure compatibility and stability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2022-49537: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix call trace observed during I/O with CMF enabled The following was seen with CMF enabled: BUG: using smp_processor_id() in preemptible code: systemd-udevd/31711 kernel: caller is lpfc_update_cmf_cmd+0x214/0x420 [lpfc] kernel: CPU: 12 PID: 31711 Comm: systemd-udevd kernel: Call Trace: kernel: <TASK> kernel: dump_stack_lvl+0x44/0x57 kernel: check_preemption_disabled+0xbf/0xe0 kernel: lpfc_update_cmf_cmd+0x214/0x420 [lpfc] kernel: lpfc_nvme_fcp_io_submit+0x23b4/0x4df0 [lpfc] this_cpu_ptr() calls smp_processor_id() in a preemptible context. Fix by using per_cpu_ptr() with raw_smp_processor_id() instead.
AI-Powered Analysis
Technical Analysis
CVE-2022-49537 is a vulnerability identified in the Linux kernel, specifically within the lpfc (LightPulse Fibre Channel) driver component. The issue arises when the driver operates with CMF (Command Management Facility) enabled. The vulnerability is related to improper use of CPU identification functions in a preemptible context. Specifically, the function this_cpu_ptr() internally calls smp_processor_id(), which is not safe to use in preemptible code paths. This misuse leads to a kernel BUG triggered during I/O operations, as observed in the systemd-udevd process. The root cause is that smp_processor_id() assumes preemption is disabled, but in this case, it was called in a preemptible context, causing instability. The fix involves replacing this_cpu_ptr() with per_cpu_ptr() combined with raw_smp_processor_id(), which safely retrieves per-CPU data without relying on preemption-disabled assumptions. This correction prevents kernel call traces and potential crashes during I/O operations involving the lpfc driver with CMF enabled. Although no known exploits are reported in the wild, the vulnerability can cause system instability or denial of service due to kernel panics or crashes triggered by the improper CPU ID usage in the driver code.
Potential Impact
For European organizations relying on Linux servers that utilize Fibre Channel storage with the lpfc driver and have CMF enabled, this vulnerability could lead to unexpected kernel crashes or system instability. Such disruptions can affect critical infrastructure, data centers, and enterprise storage environments, potentially causing downtime and impacting availability of services. While the vulnerability does not directly allow remote code execution or privilege escalation, the resulting kernel panics could lead to denial of service conditions. Organizations with high availability requirements, such as financial institutions, healthcare providers, and cloud service operators in Europe, may face operational risks if their Linux kernel versions are affected and not patched. The impact is primarily on system reliability and availability rather than confidentiality or integrity.
Mitigation Recommendations
European organizations should promptly identify Linux systems running the affected lpfc driver with CMF enabled. They should apply the vendor-provided patches or kernel updates that replace the unsafe CPU ID calls with safe alternatives (per_cpu_ptr() and raw_smp_processor_id()). In environments where immediate patching is not feasible, temporarily disabling CMF functionality in the lpfc driver could mitigate the risk of kernel crashes. Additionally, organizations should monitor system logs for kernel call traces or BUG messages related to lpfc and systemd-udevd processes as indicators of this issue. Implementing robust kernel crash recovery and system monitoring will help minimize downtime. Testing patches in staging environments before deployment is recommended to ensure compatibility and stability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.589Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982bc4522896dcbe43b1
Added to database: 5/21/2025, 9:08:59 AM
Last enriched: 6/29/2025, 10:10:09 PM
Last updated: 8/16/2025, 10:49:23 AM
Views: 17
Related Threats
CVE-2025-55455: n/a
HighCVE-2025-8193
UnknownCVE-2025-9356: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9355: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-43761: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.