U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-42124 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Make qedf_execute_tmf() non-preemptible Stop calling smp_processor_id() from preemptible code in qedf_execute_tmf90. This results in BUG_ON() when running an RT kernel. [ 659.343280] BUG: using smp_processor_id() in preemptible [00000000] code: sg_reset/3646 [ 659.343282] caller is qedf_execute_tmf+0x8b/0x360 [qedf]


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/0a8a91932b2772e75bf3f6d133ca4225d1d3e920
https://git.kernel.org/stable/c/0a8a91932b2772e75bf3f6d133ca4225d1d3e920
https://git.kernel.org/stable/c/0d8b637c9c5eeaa1a4e3dfb336f3ff918eb64fec
https://git.kernel.org/stable/c/0d8b637c9c5eeaa1a4e3dfb336f3ff918eb64fec
https://git.kernel.org/stable/c/2b9c7787cfcd1e76d873a78f16cf45bfa4b100ea
https://git.kernel.org/stable/c/2b9c7787cfcd1e76d873a78f16cf45bfa4b100ea
https://git.kernel.org/stable/c/4f314aadeed8cdf42c8cf30769425b5e44702748
https://git.kernel.org/stable/c/4f314aadeed8cdf42c8cf30769425b5e44702748
https://git.kernel.org/stable/c/5ceb40cdee721e13cbe15a0515cacf984e11236b
https://git.kernel.org/stable/c/5ceb40cdee721e13cbe15a0515cacf984e11236b
https://git.kernel.org/stable/c/b6ded5316ec56e973dcf5f9997945aad01a9f062
https://git.kernel.org/stable/c/b6ded5316ec56e973dcf5f9997945aad01a9f062
https://git.kernel.org/stable/c/fa49c65a1cec6a3901ef884fdb24d98068b63493
https://git.kernel.org/stable/c/fa49c65a1cec6a3901ef884fdb24d98068b63493

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-42124
NVD Published Date:
07/30/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org