CVE-2022-48745

Severity CVSS v4.0:
Pending analysis
Type:
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
20/06/2024
Last modified:
29/09/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/mlx5: Use del_timer_sync in fw reset flow of halting poll<br /> <br /> Substitute del_timer() with del_timer_sync() in fw reset polling<br /> deactivation flow, in order to prevent a race condition which occurs<br /> when del_timer() is called and timer is deactivated while another<br /> process is handling the timer interrupt. A situation that led to<br /> the following call trace:<br /> RIP: 0010:run_timer_softirq+0x137/0x420<br /> <br /> recalibrate_cpu_khz+0x10/0x10<br /> ktime_get+0x3e/0xa0<br /> ? sched_clock_cpu+0xb/0xc0<br /> __do_softirq+0xf5/0x2ea<br /> irq_exit_rcu+0xc1/0xf0<br /> sysvec_apic_timer_interrupt+0x9e/0xc0<br /> asm_sysvec_apic_timer_interrupt+0x12/0x20<br />

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.10 (including) 5.10.97 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.20 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.16.6 (excluding)
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*