CVE-2022-48697
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
03/05/2024
Last modified:
08/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
nvmet: fix a use-after-free<br />
<br />
Fix the following use-after-free complaint triggered by blktests nvme/004:<br />
<br />
BUG: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350<br />
Read of size 4 at addr 0000607bd1835943 by task kworker/13:1/460<br />
Workqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]<br />
Call Trace:<br />
show_stack+0x52/0x58<br />
dump_stack_lvl+0x49/0x5e<br />
print_report.cold+0x36/0x1e2<br />
kasan_report+0xb9/0xf0<br />
__asan_load4+0x6b/0x80<br />
blk_mq_complete_request_remote+0xac/0x350<br />
nvme_loop_queue_response+0x1df/0x275 [nvme_loop]<br />
__nvmet_req_complete+0x132/0x4f0 [nvmet]<br />
nvmet_req_complete+0x15/0x40 [nvmet]<br />
nvmet_execute_io_connect+0x18a/0x1f0 [nvmet]<br />
nvme_loop_execute_work+0x20/0x30 [nvme_loop]<br />
process_one_work+0x56e/0xa70<br />
worker_thread+0x2d1/0x640<br />
kthread+0x183/0x1c0<br />
ret_from_fork+0x1f/0x30
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.8 (including) | 4.19.260 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.213 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.143 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.68 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.19.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/17f121ca3ec6be0fb32d77c7f65362934a38cc8e
- https://git.kernel.org/stable/c/4484ce97a78171668c402e0c45db7f760aea8060
- https://git.kernel.org/stable/c/6a02a61e81c231cc5c680c5dbf8665275147ac52
- https://git.kernel.org/stable/c/8d66989b5f7bb28bba2f8e1e2ffc8bfef4a10717
- https://git.kernel.org/stable/c/be01f1c988757b95f11f090a9f491365670a522b
- https://git.kernel.org/stable/c/ebf46da50beb78066674354ad650606a467e33fa
- https://git.kernel.org/stable/c/17f121ca3ec6be0fb32d77c7f65362934a38cc8e
- https://git.kernel.org/stable/c/4484ce97a78171668c402e0c45db7f760aea8060
- https://git.kernel.org/stable/c/6a02a61e81c231cc5c680c5dbf8665275147ac52
- https://git.kernel.org/stable/c/8d66989b5f7bb28bba2f8e1e2ffc8bfef4a10717
- https://git.kernel.org/stable/c/be01f1c988757b95f11f090a9f491365670a522b
- https://git.kernel.org/stable/c/ebf46da50beb78066674354ad650606a467e33fa



