CVE-2022-48789

Source
https://cve.org/CVERecord?id=CVE-2022-48789
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48789.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48789
Downstream
Related
Published
2024-07-16T11:43:45.894Z
Modified
2026-03-13T05:59:30.977188Z
Summary
nvme-tcp: fix possible use-after-free in transport error_recovery work
Details

In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: fix possible use-after-free in transport error_recovery work

While nvmetcpsubmitasynceventwork is checking the ctrl and queue state before preparing the AER command and scheduling iowork, in order to fully prevent a race where this check is not reliable the error recovery work must flush asynceventwork before continuing to destroy the admin queue after setting the ctrl state to RESETTING such that there is no race .submitasyncevent and the error recovery handler itself changing the ctrl state.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48789.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3f2304f8c6d6ed97849057bd16fee99e434ca796
Fixed
61a26ffd5ad3ece456d74c4c79f7b5e3f440a141
Fixed
e192184cf8bce8dd55d619f5611a2eaba996fa05
Fixed
5e42fca37ccc76f39f73732661bd47254cad5982
Fixed
bb0d8fb35c4ff00a503c2c4dca4cce8d102a21c4
Fixed
ff9fc7ebf5c06de1ef72a69f9b1ab40af8b07f9e

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48789.json"