{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-38288","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T04:51:24.001Z","datePublished":"2025-07-10T07:42:04.862Z","dateUpdated":"2026-05-11T21:25:04.345Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:25:04.345Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: smartpqi: Fix smp_processor_id() call trace for preemptible kernels\n\nCorrect kernel call trace when calling smp_processor_id() when called in\npreemptible kernels by using raw_smp_processor_id().\n\nsmp_processor_id() checks to see if preemption is disabled and if not,\nissue an error message followed by a call to dump_stack().\n\nBrief example of call trace:\nkernel:  check_preemption_disabled: 436 callbacks suppressed\nkernel:  BUG: using smp_processor_id() in preemptible [00000000]\n         code: kworker/u1025:0/2354\nkernel:  caller is pqi_scsi_queue_command+0x183/0x310 [smartpqi]\nkernel:  CPU: 129 PID: 2354 Comm: kworker/u1025:0\nkernel:  ...\nkernel:  Workqueue: writeback wb_workfn (flush-253:0)\nkernel:  Call Trace:\nkernel:   <TASK>\nkernel:   dump_stack_lvl+0x34/0x48\nkernel:   check_preemption_disabled+0xdd/0xe0\nkernel:   pqi_scsi_queue_command+0x183/0x310 [smartpqi]\nkernel:  ..."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/scsi/smartpqi/smartpqi_init.c"],"versions":[{"version":"283dcc1b142ebd60786f8f5e3fbbd53a51035739","lessThan":"6589bc3699bcb45b35b3095c44a5af7a4d75ef7e","status":"affected","versionType":"git"},{"version":"283dcc1b142ebd60786f8f5e3fbbd53a51035739","lessThan":"31224199316f488c8385c5dcdccf7bd80f675b81","status":"affected","versionType":"git"},{"version":"283dcc1b142ebd60786f8f5e3fbbd53a51035739","lessThan":"42d033cf4b517e91c187ad2fbd7b30fdc6d2d62c","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/scsi/smartpqi/smartpqi_init.c"],"versions":[{"version":"6.12","status":"affected"},{"version":"0","lessThan":"6.12","status":"unaffected","versionType":"semver"},{"version":"6.12.34","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.15.3","lessThanOrEqual":"6.15.*","status":"unaffected","versionType":"semver"},{"version":"6.16","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12","versionEndExcluding":"6.12.34"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12","versionEndExcluding":"6.15.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12","versionEndExcluding":"6.16"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/6589bc3699bcb45b35b3095c44a5af7a4d75ef7e"},{"url":"https://git.kernel.org/stable/c/31224199316f488c8385c5dcdccf7bd80f675b81"},{"url":"https://git.kernel.org/stable/c/42d033cf4b517e91c187ad2fbd7b30fdc6d2d62c"}],"title":"scsi: smartpqi: Fix smp_processor_id() call trace for preemptible kernels","x_generator":{"engine":"bippy-1.2.0"}}}}