In the Linux kernel, the following vulnerability has been resolved:
nvme-rdma: fix possible use-after-free in transport error_recovery work
While nvme_rdma_submit_async_event_work is checking the ctrl and queue
state before preparing the AER command and scheduling io_work, in order
to fully prevent a race where this check is not reliable the error
recovery work must flush async_event_work before continuing to destroy
the admin queue after setting the ctrl state to RESETTING such that
there is no race .submit_async_event and the error recovery handler
itself changing the ctrl state.
References
Configurations
Configuration 1 (hide)
|
History
10 Jan 2025, 19:06
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:* |
Information
Published : 2024-07-16 12:15
Updated : 2025-01-10 19:06
NVD link : CVE-2022-48788
Mitre link : CVE-2022-48788
CVE.ORG link : CVE-2022-48788
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free