{"id":"CVE-2024-42124","summary":"scsi: qedf: Make qedf_execute_tmf() non-preemptible","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Make qedf_execute_tmf() non-preemptible\n\nStop calling smp_processor_id() from preemptible code in\nqedf_execute_tmf90.  This results in BUG_ON() when running an RT kernel.\n\n[ 659.343280] BUG: using smp_processor_id() in preemptible [00000000] code: sg_reset/3646\n[ 659.343282] caller is qedf_execute_tmf+0x8b/0x360 [qedf]","modified":"2026-05-18T05:58:55.805618030Z","published":"2024-07-30T07:46:16.052Z","related":["ALSA-2024:7000","ALSA-2024:7001","SUSE-SU-2024:2892-1","SUSE-SU-2024:2894-1","SUSE-SU-2024:2901-1","SUSE-SU-2024:2939-1","SUSE-SU-2024:2940-1","SUSE-SU-2024:2947-1","SUSE-SU-2024:3194-1","SUSE-SU-2024:3195-1","SUSE-SU-2024:3383-1","SUSE-SU-2025:20044-1","SUSE-SU-2025:20047-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42124.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0a8a91932b2772e75bf3f6d133ca4225d1d3e920"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0d8b637c9c5eeaa1a4e3dfb336f3ff918eb64fec"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2b9c7787cfcd1e76d873a78f16cf45bfa4b100ea"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4f314aadeed8cdf42c8cf30769425b5e44702748"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5ceb40cdee721e13cbe15a0515cacf984e11236b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b6ded5316ec56e973dcf5f9997945aad01a9f062"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fa49c65a1cec6a3901ef884fdb24d98068b63493"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42124.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42124"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"61d8658b4a435eac729966cc94cdda077a8df5cd"},{"fixed":"4f314aadeed8cdf42c8cf30769425b5e44702748"},{"fixed":"5ceb40cdee721e13cbe15a0515cacf984e11236b"},{"fixed":"0a8a91932b2772e75bf3f6d133ca4225d1d3e920"},{"fixed":"fa49c65a1cec6a3901ef884fdb24d98068b63493"},{"fixed":"b6ded5316ec56e973dcf5f9997945aad01a9f062"},{"fixed":"2b9c7787cfcd1e76d873a78f16cf45bfa4b100ea"},{"fixed":"0d8b637c9c5eeaa1a4e3dfb336f3ff918eb64fec"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42124.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.11.0"},{"fixed":"5.4.280"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.222"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.163"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.98"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.39"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.9.9"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42124.json"}}],"schema_version":"1.7.5"}