CVE-2022-48890

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-48890
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48890.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48890
Downstream
Related
Published
2024-08-21T06:10:22Z
Modified
2025-10-08T06:44:03.868099Z
Summary
scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM

storvscqueuecommand() maps the scatter/gather list using scsidmamap(), which in a confidential VM allocates swiotlb bounce buffers. If the I/O submission fails in storvscdo_io(), the I/O is typically retried by higher level code, but the bounce buffer memory is never freed. The mostly like cause of I/O submission failure is a full VMBus channel ring buffer, which is not uncommon under high I/O loads. Eventually enough bounce buffer memory leaks that the confidential VM can't do any I/O. The same problem can arise in a non-confidential VM with kernel boot parameter swiotlb=force.

Fix this by doing scsidmaunmap() in the case of an I/O submission error, which frees the bounce buffer memory.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
743b237c3a7b0f5b44aa704aae8a1058877b6322
Fixed
87c71e88f6a6619ffb1ff88f84dff48ef6d57adb
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
743b237c3a7b0f5b44aa704aae8a1058877b6322
Fixed
67ff3d0a49f3d445c3922e30a54e03c161da561e

Affected versions

v5.*

v5.16
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.2
v6.1.3
v6.1.4
v6.1.5
v6.1.6

Database specific

{
    "vanir_signatures": [
        {
            "signature_type": "Function",
            "deprecated": false,
            "signature_version": "v1",
            "digest": {
                "length": 2638.0,
                "function_hash": "184821857264601518052598031642888141010"
            },
            "id": "CVE-2022-48890-0fd4c810",
            "target": {
                "file": "drivers/scsi/storvsc_drv.c",
                "function": "storvsc_queuecommand"
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@87c71e88f6a6619ffb1ff88f84dff48ef6d57adb"
        },
        {
            "signature_type": "Line",
            "deprecated": false,
            "signature_version": "v1",
            "digest": {
                "line_hashes": [
                    "132460952986978051917696031989102031797",
                    "169566271865076041396762107045842728390",
                    "290785843913529746840370975794278068739"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2022-48890-a086a3e8",
            "target": {
                "file": "drivers/scsi/storvsc_drv.c"
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@87c71e88f6a6619ffb1ff88f84dff48ef6d57adb"
        },
        {
            "signature_type": "Function",
            "deprecated": false,
            "signature_version": "v1",
            "digest": {
                "length": 2638.0,
                "function_hash": "184821857264601518052598031642888141010"
            },
            "id": "CVE-2022-48890-d81077d7",
            "target": {
                "file": "drivers/scsi/storvsc_drv.c",
                "function": "storvsc_queuecommand"
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@67ff3d0a49f3d445c3922e30a54e03c161da561e"
        },
        {
            "signature_type": "Line",
            "deprecated": false,
            "signature_version": "v1",
            "digest": {
                "line_hashes": [
                    "132460952986978051917696031989102031797",
                    "169566271865076041396762107045842728390",
                    "290785843913529746840370975794278068739"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2022-48890-db921117",
            "target": {
                "file": "drivers/scsi/storvsc_drv.c"
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@67ff3d0a49f3d445c3922e30a54e03c161da561e"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.17.0
Fixed
6.1.7