{"id":"CVE-2022-49492","summary":"nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags\n\nIn nvme_alloc_admin_tags, the admin_q can be set to an error (typically\n-ENOMEM) if the blk_mq_init_queue call fails to set up the queue, which\nis checked immediately after the call. However, when we return the error\nmessage up the stack, to nvme_reset_work the error takes us to\nnvme_remove_dead_ctrl()\n  nvme_dev_disable()\n   nvme_suspend_queue(&dev-\u003equeues[0]).\n\nHere, we only check that the admin_q is non-NULL, rather than not\nan error or NULL, and begin quiescing a queue that never existed, leading\nto bad / NULL pointer dereference.","modified":"2026-04-02T08:27:38.739101Z","published":"2025-02-26T02:13:28.820Z","related":["SUSE-SU-2025:03310-1","SUSE-SU-2025:03384-1","SUSE-SU-2025:1027-1","SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1241-1","SUSE-SU-2025:1293-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49492.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/54a4c1e47d1b2585e74920399455bd9abbfb2bd7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7a28556082d1fbcbc599baf1c24252dfc73efefc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8321b17789f614414206af07e17ce4751c95dc76"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8da2b7bdb47e94bbc4062a3978c708926bcb022c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/906c81dba8ee8057523859b5e1a2479e9fd34860"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9e649471b396fa0139d53919354ce1eace9b9a24"},{"type":"WEB","url":"https://git.kernel.org/stable/c/af98940dd33c9f9e1beb4f71c0a39260100e2a65"},{"type":"WEB","url":"https://git.kernel.org/stable/c/da42761181627e9bdc37d18368b827948a583929"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f76729662650cd7bc8f8194e057af381370349a7"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49492.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49492"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"35b489d32fcc37e8735f41aa794b24cf9d1e74f5"},{"fixed":"8321b17789f614414206af07e17ce4751c95dc76"},{"fixed":"9e649471b396fa0139d53919354ce1eace9b9a24"},{"fixed":"8da2b7bdb47e94bbc4062a3978c708926bcb022c"},{"fixed":"f76729662650cd7bc8f8194e057af381370349a7"},{"fixed":"af98940dd33c9f9e1beb4f71c0a39260100e2a65"},{"fixed":"906c81dba8ee8057523859b5e1a2479e9fd34860"},{"fixed":"7a28556082d1fbcbc599baf1c24252dfc73efefc"},{"fixed":"54a4c1e47d1b2585e74920399455bd9abbfb2bd7"},{"fixed":"da42761181627e9bdc37d18368b827948a583929"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49492.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}