CVE-2022-48816

Source
https://cve.org/CVERecord?id=CVE-2022-48816
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48816.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-48816
Downstream
Related
Published
2024-07-16T11:44:04.654Z
Modified
2026-03-14T11:56:19.853138Z
Summary
SUNRPC: lock against ->sock changing during sysfs read
Details

In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: lock against ->sock changing during sysfs read

->sock can be set to NULL asynchronously unless ->recv_mutex is held. So it is important to hold that mutex. Otherwise a sysfs read can trigger an oops. Commit 17f09d3f619a ("SUNRPC: Check if the xprt is connected before handling sysfs reads") appears to attempt to fix this problem, but it only narrows the race window.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48816.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a8482488a7d6d320f63a9ee1912dbb5ae5b80a61
Fixed
9482ab4540f5bcc869b44c067ae99b5fca16bd07
Fixed
b49ea673e119f59c71645e2f65b3ccad857c90ee
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
21a2be1a5145d072deedc7cdc5b2d17380abea75
Last affected
77876473912d1bf1ed16bffa1674e5ff0f499f25

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48816.json"