"value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnvme: tcp: avoid race between queue_lock lock and destroy\n\nCommit 76d54bf20cdc (\"nvme-tcp: don't access released socket during\nerror recovery\")addedamutex_lock()callforthequeue->queue_lock\ninnvme_tcp_get_address().However,themutex_lock()raceswith\nmutex_destroy()innvme_tcp_free_queue(),andcausestheWARNbelow.\n\nDEBUG_LOCKS_WARN_ON(lock->magic!=lock)\nWARNING:CPU:3PID:34077atkernel/locking/mutex.c:587__mutex_lock+0xcf0/0x1220\nModuleslinkedin:nvmet_tcpnvmetnvme_tcpnvme_fabricsiw_cmib_cmib_corepktcdvdnft_fib_inetnft_fib_ipv4nft_fib_ipv6nft_fibnft_reject_inetnf_reject_ipv4nf_reject_ipv6nft_rejectnft_ctnft_chain_natnf_natnf_conntracknf_defrag_ipv6nf_defrag_ipv4ip_setnf_tablesqrtrsunrpcppdev9pnet_virtio9pnetpcspkrnetfsparport_pcparporte1000i2c_piix4i2c_smbusloopfusenfnetlinkzrambochsdrm_vram_helperdrm_ttm_helperttmdrm_kms_helperxfsdrmsym53c8xxfloppynvmescsi_transport_spinvme_corenvme_authserio_rawata_genericpata_acpidm_multipathqemu_fw_cfg[lastunloaded:ib_uverbs]\nCPU:3UID:0PID:34077Comm:udisksdNottainted6.11.0-rc7#319\nHardwarename:QEMUStandardPC(i440FX+PIIX,1996),BIOS1.16.3-2.fc4004/01/2014\nRIP:0010:__mutex_lock+0xcf0/0x1220\nCode:0884d20f85c80400008b15efb6c80185d20f8578f4ffff48c7c62093eeaf48c7c76091eeafe8f0a76dfd<0f>0be95ef4ffff48b80000000000fcffdf4c89f248c1\nRSP:0018:ffff88811305f760EFLAGS:00010286\nRAX:0000000000000000RBX:ffff88812c652058RCX:0000000000000000\nRDX:0000000000000000RSI:0000000000000004RDI:0000000000000001\nRBP:ffff88811305f8b0R08:0000000000000001R09:ffffed1075c36341\nR10:ffff8883ae1b1a0bR11:0000000000010498R12:0000000000000000\nR13:0000000000000000R14:dffffc0000000000R15:ffff88812c652058\nFS:00007f9713ae4980(0000)GS:ffff8883ae180000(0000)knlGS:0000000000000000\nCS:0010DS:0000ES:0000CR0:0000000080050033\nCR2:00007fcd78483c7cCR3:0000000122c38000CR4:00000000000006f0\nDR0:0000000000000000DR1:0000000000000000DR2:0000000000000000\nDR3:0000000000000000DR6:00000000fffe0ff0DR7:0000000000000400\nCallTrace:\n<TASK>\n?__warn.cold+0x5b/0x1af\n?__mutex_lock+0xcf0/0x1220\n?report_bug+0x1ec/0x390\n?handle_bug+0x3c/0x80\n?exc_invalid_op+0x13/0x40\n?asm_exc_invalid_op+0x16/0x20\n?__mutex_lock+0xcf0/0x1220\n?nvme_tcp_get_address+0xc2/0x1e0[nvme_tcp]\n?__pfx___mutex_lock+0x10/0x10\n?__lock_acquire+0xd6a/0x59e0\n?nvme_tcp_get_address+0xc2/0x1e0[nvme_tcp]\nnvme_tcp_get_address+0xc2/0x1e0[nvme_tcp]\n?__pfx_nvme_tcp_get_address+0x10/0x10[nvme_tcp]\nnvme_sysfs_show_address+0x81/0xc0[nvme_core]\ndev_attr_show+0x42/0x80\n?__asan_memset+0x1f/0x40\nsysfs_kf_seq_show+0x1f0/0x370\nseq_read_iter+0x2cb/0x1130\n?rw_verify_area+0x3b1/0x590\n?__mutex_lock+0x433/0x1220\nvfs_read+0x6a6/0xa20\n?lockdep_hardirqs_on+0x78/0x100\n?__pfx_vfs_read+0x10/0x10\nksys_read+0xf7/0x1d0\n?__pfx_ksys_read+0x10/0x10\n?__x64_sys_openat+0x105/0x1d0\ndo_syscall_64+0x93/0x180\n?lockdep_hardirqs_on_prepare+0x16d/0x400\n?do_syscall_64+0x9f/0x180\n?lockdep_hardirqs_on+0x78/0x100\n?do_syscall_64+0x9f/0x180\n?__pfx_ksys_read+0x10/0x10\n?lockdep_hardirqs_on_prepare+0x16d/0x400\n?do_syscall_64+0x9f/0x180\n?lockdep_hardirqs_on+0x78/0x100\n?do_syscall_64+0x9f/0x180\n?lockdep_hardirqs_on_prepare+0x16d/0x400\n?do_syscall_64+0x9f/0x180\n?lockdep_hardirqs_on+0x78/0x100\n?do_syscall_64+0x9f/0x180\n?lockdep_hardirqs_on_prepare+0x16d/0x400\n?do_syscall_64+0x9f/0x180\n?lockdep_hardirqs_on+0x78/0x100\n?do_syscall_64+0x9f/0x180\n?lockdep_hardirqs_on_prepare+0x16d/0x400\n?do_syscall_64+0x9f/0x180\n?lockdep_hardirqs_on+0x78/0x100\n?do_syscall_64+0x9f/0x180\n?do_syscall_64+0x9f/0x180\nentry_SYSCALL_64_after_hwframe+0x76/0x7e\nRIP:0033:0x7f9713f55cfa\nCode:554889e54883ec20488955e8488975f0897df8e8e874f8ff488b55e8488b75f04\n---truncated-