We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-48636

s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup



Description

In the Linux kernel, the following vulnerability has been resolved: s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup Fix Oops in dasd_alias_get_start_dev() function caused by the pavgroup pointer being NULL. The pavgroup pointer is checked on the entrance of the function but without the lcu->lock being held. Therefore there is a race window between dasd_alias_get_start_dev() and _lcu_update() which sets pavgroup to NULL with the lcu->lock held. Fix by checking the pavgroup pointer with lcu->lock held.

Reserved 2024-02-25 | Published 2024-04-28 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

8e09f21574ea3028d5629e5de759e0b196c690c5 before d86b4267834e6d4af62e3073e48166e349ab1b70
affected

8e09f21574ea3028d5629e5de759e0b196c690c5 before 49f401a98b318761ca2e15d4c7869a20043fbed4
affected

8e09f21574ea3028d5629e5de759e0b196c690c5 before aaba5ff2742043705bc4c02fd0b2b246e2e16da1
affected

8e09f21574ea3028d5629e5de759e0b196c690c5 before 2e473351400e3dd66f0b71eddcef82ee45a584c1
affected

8e09f21574ea3028d5629e5de759e0b196c690c5 before f5fcc9d6d71d9ff7fdbdd4b89074e6e24fffc20b
affected

8e09f21574ea3028d5629e5de759e0b196c690c5 before d3a67c21b18f33c79382084af556557c442f12a6
affected

8e09f21574ea3028d5629e5de759e0b196c690c5 before 650a2e79d176db753654d3dde88e53a2033036ac
affected

8e09f21574ea3028d5629e5de759e0b196c690c5 before db7ba07108a48c0f95b74fabbfd5d63e924f992d
affected

Default status
affected

2.6.25
affected

Any version before 2.6.25
unaffected

4.9.330
unaffected

4.14.295
unaffected

4.19.260
unaffected

5.4.215
unaffected

5.10.146
unaffected

5.15.71
unaffected

5.19.12
unaffected

6.0
unaffected

References

git.kernel.org/...c/d86b4267834e6d4af62e3073e48166e349ab1b70

git.kernel.org/...c/49f401a98b318761ca2e15d4c7869a20043fbed4

git.kernel.org/...c/aaba5ff2742043705bc4c02fd0b2b246e2e16da1

git.kernel.org/...c/2e473351400e3dd66f0b71eddcef82ee45a584c1

git.kernel.org/...c/f5fcc9d6d71d9ff7fdbdd4b89074e6e24fffc20b

git.kernel.org/...c/d3a67c21b18f33c79382084af556557c442f12a6

git.kernel.org/...c/650a2e79d176db753654d3dde88e53a2033036ac

git.kernel.org/...c/db7ba07108a48c0f95b74fabbfd5d63e924f992d

cve.org (CVE-2022-48636)

nvd.nist.gov (CVE-2022-48636)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2022-48636

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.