{"id":"CVE-2022-48636","summary":"s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup\n\nFix Oops in dasd_alias_get_start_dev() function caused by the pavgroup\npointer being NULL.\n\nThe pavgroup pointer is checked on the entrance of the function but\nwithout the lcu-\u003elock being held. Therefore there is a race window\nbetween dasd_alias_get_start_dev() and _lcu_update() which sets\npavgroup to NULL with the lcu-\u003elock held.\n\nFix by checking the pavgroup pointer with lcu-\u003elock held.","modified":"2026-04-11T12:41:16.126475Z","published":"2024-04-28T12:59:28.858Z","related":["SUSE-SU-2024:1643-1","SUSE-SU-2024:1644-1","SUSE-SU-2024:1646-1","SUSE-SU-2024:1659-1","SUSE-SU-2024:1663-1","SUSE-SU-2024:1870-1","SUSE-SU-2024:1983-1","SUSE-SU-2024:2010-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2184-1","SUSE-SU-2024:2185-1","SUSE-SU-2024:2189-1","SUSE-SU-2025:0231-1","SUSE-SU-2025:0834-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48636.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2e473351400e3dd66f0b71eddcef82ee45a584c1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/49f401a98b318761ca2e15d4c7869a20043fbed4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/650a2e79d176db753654d3dde88e53a2033036ac"},{"type":"WEB","url":"https://git.kernel.org/stable/c/aaba5ff2742043705bc4c02fd0b2b246e2e16da1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d3a67c21b18f33c79382084af556557c442f12a6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d86b4267834e6d4af62e3073e48166e349ab1b70"},{"type":"WEB","url":"https://git.kernel.org/stable/c/db7ba07108a48c0f95b74fabbfd5d63e924f992d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f5fcc9d6d71d9ff7fdbdd4b89074e6e24fffc20b"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48636.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48636"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"8e09f21574ea3028d5629e5de759e0b196c690c5"},{"fixed":"d86b4267834e6d4af62e3073e48166e349ab1b70"},{"fixed":"49f401a98b318761ca2e15d4c7869a20043fbed4"},{"fixed":"aaba5ff2742043705bc4c02fd0b2b246e2e16da1"},{"fixed":"2e473351400e3dd66f0b71eddcef82ee45a584c1"},{"fixed":"f5fcc9d6d71d9ff7fdbdd4b89074e6e24fffc20b"},{"fixed":"d3a67c21b18f33c79382084af556557c442f12a6"},{"fixed":"650a2e79d176db753654d3dde88e53a2033036ac"},{"fixed":"db7ba07108a48c0f95b74fabbfd5d63e924f992d"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48636.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.25"},{"fixed":"4.9.330"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.10.0"},{"fixed":"4.14.295"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.260"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.215"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.146"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.71"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"5.19.12"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48636.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}