
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability has been identified and resolved involving the improper use of smpprocessorid() instead of rawsmpprocessorid() in the qla2xxx SCSI driver. The issue was discovered when a call trace was observed during NVME-FC controller connection, showing the use of smpprocessor_id() in preemptible code (NVD).
The vulnerability manifests in the qlanvmepostcmd function of the qla2xxx driver, where smpprocessorid() was incorrectly used in preemptible code. The issue occurs specifically when CONFIGDEBUGPREEMPT is enabled. The fix involves replacing smpprocessorid() with rawsmpprocessorid() and modifying the driver to use queuework() instead of queueworkon() to avoid smpprocessor_id() usage in preemptible contexts (NVD).
When triggered, this vulnerability can cause system instability and potential crashes, as evidenced by the BUG warning message observed in the kernel logs. The issue affects systems running the Linux kernel with the qla2xxx driver, particularly in configurations using NVME-FC storage (NVD).
The vulnerability has been addressed through a kernel patch that replaces smpprocessorid() with rawsmpprocessorid() and modifies the queuework implementation. Users should update to the patched version of the Linux kernel to mitigate this issue (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."