CVE-2022-48791
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
16/07/2024
Last modified:
07/08/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
scsi: pm8001: Fix use-after-free for aborted TMF sas_task<br />
<br />
Currently a use-after-free may occur if a TMF sas_task is aborted before we<br />
handle the IO completion in mpi_ssp_completion(). The abort occurs due to<br />
timeout.<br />
<br />
When the timeout occurs, the SAS_TASK_STATE_ABORTED flag is set and the<br />
sas_task is freed in pm8001_exec_internal_tmf_task().<br />
<br />
However, if the I/O completion occurs later, the I/O completion still<br />
thinks that the sas_task is available. Fix this by clearing the ccb->task<br />
if the TMF times out - the I/O completion handler does nothing if this<br />
pointer is cleared.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.102 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.25 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.16.11 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



