{
  "threat_severity" : "Moderate",
  "public_date" : "2025-07-10T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: scsi: smartpqi: Fix smp_processor_id() call trace for preemptible kernels",
    "id" : "2379204",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2379204"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
    "status" : "verified"
  },
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nscsi: smartpqi: Fix smp_processor_id() call trace for preemptible kernels\nCorrect kernel call trace when calling smp_processor_id() when called in\npreemptible kernels by using raw_smp_processor_id().\nsmp_processor_id() checks to see if preemption is disabled and if not,\nissue an error message followed by a call to dump_stack().\nBrief example of call trace:\nkernel:  check_preemption_disabled: 436 callbacks suppressed\nkernel:  BUG: using smp_processor_id() in preemptible [00000000]\ncode: kworker/u1025:0/2354\nkernel:  caller is pqi_scsi_queue_command+0x183/0x310 [smartpqi]\nkernel:  CPU: 129 PID: 2354 Comm: kworker/u1025:0\nkernel:  ...\nkernel:  Workqueue: writeback wb_workfn (flush-253:0)\nkernel:  Call Trace:\nkernel:   <TASK>\nkernel:   dump_stack_lvl+0x34/0x48\nkernel:   check_preemption_disabled+0xdd/0xe0\nkernel:   pqi_scsi_queue_command+0x183/0x310 [smartpqi]\nkernel:  ..." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "release_date" : "2025-11-11T00:00:00Z",
    "advisory" : "RHSA-2025:20095",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10.1",
    "package" : "kernel-0:6.12.0-124.8.1.el10_1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-11-11T00:00:00Z",
    "advisory" : "RHSA-2025:20518",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-611.5.1.el9_7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-11-11T00:00:00Z",
    "advisory" : "RHSA-2025:20518",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-611.5.1.el9_7"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-38288\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38288\nhttps://lore.kernel.org/linux-cve-announce/2025071011-CVE-2025-38288-5c5a@gregkh/T" ],
  "name" : "CVE-2025-38288",
  "csaw" : false
}