CVE-2022-48697

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
03/05/2024
Last modified:
08/04/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> nvmet: fix a use-after-free<br /> <br /> Fix the following use-after-free complaint triggered by blktests nvme/004:<br /> <br /> BUG: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350<br /> Read of size 4 at addr 0000607bd1835943 by task kworker/13:1/460<br /> Workqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]<br /> Call Trace:<br /> show_stack+0x52/0x58<br /> dump_stack_lvl+0x49/0x5e<br /> print_report.cold+0x36/0x1e2<br /> kasan_report+0xb9/0xf0<br /> __asan_load4+0x6b/0x80<br /> blk_mq_complete_request_remote+0xac/0x350<br /> nvme_loop_queue_response+0x1df/0x275 [nvme_loop]<br /> __nvmet_req_complete+0x132/0x4f0 [nvmet]<br /> nvmet_req_complete+0x15/0x40 [nvmet]<br /> nvmet_execute_io_connect+0x18a/0x1f0 [nvmet]<br /> nvme_loop_execute_work+0x20/0x30 [nvme_loop]<br /> process_one_work+0x56e/0xa70<br /> worker_thread+0x2d1/0x640<br /> kthread+0x183/0x1c0<br /> ret_from_fork+0x1f/0x30

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.8 (including) 4.19.260 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.213 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.143 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.68 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.19.9 (excluding)
cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*