CVE-2022-48792

Source
https://cve.org/CVERecord?id=CVE-2022-48792
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48792.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-48792
Downstream
Related
Published
2024-07-16T11:43:48.026Z
Modified
2026-03-14T12:00:41.369500Z
Summary
scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task

Currently a use-after-free may occur if a sastask is aborted by the upper layer before we handle the I/O completion in mpisspcompletion() or mpisata_completion().

In this case, the following are the two steps in handling those I/O completions:

  • Call complete() to inform the upper layer handler of completion of the I/O.

  • Release driver resources associated with the sastask in pm8001ccbtaskfree() call.

When complete() is called, the upper layer may free the sastask. As such, we should not touch the associated sastask afterwards, but we do so in the pm8001ccbtask_free() call.

Fix by swapping the complete() and pm8001ccbtask_free() calls ordering.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48792.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
869ddbdcae3b4fb83b99889abae31544c149b210
Fixed
fe9ac3eaa2e387a5742b380b73a5a6bc237bf184
Fixed
d9d93f32534a0a80a1c26bdb0746d90a7b19c2c2
Fixed
f61f9fccb2cb4bb275674a79d638704db6bc2171
Fixed
df7abcaa1246e2537ab4016077b5443bb3c09378

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48792.json"