First published: Fri May 03 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: nvmet: fix a use-after-free Fix the following use-after-free complaint triggered by blktests nvme/004: BUG: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350 Read of size 4 at addr 0000607bd1835943 by task kworker/13:1/460 Workqueue: nvmet-wq nvme_loop_execute_work [nvme_loop] Call Trace: show_stack+0x52/0x58 dump_stack_lvl+0x49/0x5e print_report.cold+0x36/0x1e2 kasan_report+0xb9/0xf0 __asan_load4+0x6b/0x80 blk_mq_complete_request_remote+0xac/0x350 nvme_loop_queue_response+0x1df/0x275 [nvme_loop] __nvmet_req_complete+0x132/0x4f0 [nvmet] nvmet_req_complete+0x15/0x40 [nvmet] nvmet_execute_io_connect+0x18a/0x1f0 [nvmet] nvme_loop_execute_work+0x20/0x30 [nvme_loop] process_one_work+0x56e/0xa70 worker_thread+0x2d1/0x640 kthread+0x183/0x1c0 ret_from_fork+0x1f/0x30
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel | ||
Linux Kernel | >=4.8<4.19.260 | |
Linux Kernel | >=4.20<5.4.213 | |
Linux Kernel | >=5.5<5.10.143 | |
Linux Kernel | >=5.11<5.15.68 | |
Linux Kernel | >=5.16<5.19.9 | |
Linux Kernel | =6.0-rc1 | |
Linux Kernel | =6.0-rc2 | |
Linux Kernel | =6.0-rc3 | |
Linux Kernel | =6.0-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48697 is classified as a high severity vulnerability due to its potential to cause a use-after-free condition.
To fix CVE-2022-48697, you should update the Linux kernel to the latest version that patches this vulnerability.
CVE-2022-48697 affects several versions of the Linux kernel, including versions from 4.8 to 6.0-rc4.
CVE-2022-48697 is a use-after-free vulnerability found in the Linux kernel.
The potential impacts of CVE-2022-48697 include crashes, system instability, or the possibility of remote code execution.