CVE-2022-48792
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
16/07/2024
Last modified:
07/08/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task<br />
<br />
Currently a use-after-free may occur if a sas_task is aborted by the upper<br />
layer before we handle the I/O completion in mpi_ssp_completion() or<br />
mpi_sata_completion().<br />
<br />
In this case, the following are the two steps in handling those I/O<br />
completions:<br />
<br />
- Call complete() to inform the upper layer handler of completion of<br />
the I/O.<br />
<br />
- Release driver resources associated with the sas_task in<br />
pm8001_ccb_task_free() call.<br />
<br />
When complete() is called, the upper layer may free the sas_task. As such,<br />
we should not touch the associated sas_task afterwards, but we do so in the<br />
pm8001_ccb_task_free() call.<br />
<br />
Fix by swapping the complete() and pm8001_ccb_task_free() calls ordering.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.102 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.25 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.16.11 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



