CVE-2022-48697

Source
https://cve.org/CVERecord?id=CVE-2022-48697
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48697.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48697
Downstream
Related
Published
2024-05-03T15:10:30.963Z
Modified
2026-04-11T12:41:17.132640Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
nvmet: fix a use-after-free
Details

In the Linux kernel, the following vulnerability has been resolved:

nvmet: fix a use-after-free

Fix the following use-after-free complaint triggered by blktests nvme/004:

BUG: KASAN: user-memory-access in blkmqcompleterequestremote+0xac/0x350 Read of size 4 at addr 0000607bd1835943 by task kworker/13:1/460 Workqueue: nvmet-wq nvmeloopexecutework [nvmeloop] Call Trace: showstack+0x52/0x58 dumpstacklvl+0x49/0x5e printreport.cold+0x36/0x1e2 kasan_report+0xb9/0xf0 __asanload4+0x6b/0x80 blkmqcompleterequestremote+0xac/0x350 nvmeloopqueueresponse+0x1df/0x275 [nvme_loop] __nvmetreqcomplete+0x132/0x4f0 [nvmet] nvmetreqcomplete+0x15/0x40 [nvmet] nvmetexecuteioconnect+0x18a/0x1f0 [nvmet] nvmeloopexecutework+0x20/0x30 [nvmeloop] processonework+0x56e/0xa70 workerthread+0x2d1/0x640 kthread+0x183/0x1c0 retfromfork+0x1f/0x30

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48697.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a07b4970f464f13640e28e16dad6cfa33647cc99
Fixed
17f121ca3ec6be0fb32d77c7f65362934a38cc8e
Fixed
8d66989b5f7bb28bba2f8e1e2ffc8bfef4a10717
Fixed
be01f1c988757b95f11f090a9f491365670a522b
Fixed
ebf46da50beb78066674354ad650606a467e33fa
Fixed
4484ce97a78171668c402e0c45db7f760aea8060
Fixed
6a02a61e81c231cc5c680c5dbf8665275147ac52

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48697.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.8.0
Fixed
4.19.260
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.213
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.143
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.68
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48697.json"