CVE-2022-49720

Source
https://cve.org/CVERecord?id=CVE-2022-49720
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49720.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49720
Downstream
Related
Published
2025-02-26T02:24:34.194Z
Modified
2026-03-12T03:25:40.849460Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
block: Fix handling of offline queues in blk_mq_alloc_request_hctx()
Details

In the Linux kernel, the following vulnerability has been resolved:

block: Fix handling of offline queues in blkmqallocrequesthctx()

This patch prevents that test nvme/004 triggers the following:

UBSAN: array-index-out-of-bounds in block/blk-mq.h:135:9 index 512 is out of range for type 'long unsigned int [512]' Call Trace: showstack+0x52/0x58 dumpstacklvl+0x49/0x5e dumpstack+0x10/0x12 ubsan_epilogue+0x9/0x3b __ubsanhandleoutofbounds.cold+0x44/0x49 blkmqallocrequesthctx+0x304/0x310 __nvmesubmitsync_cmd+0x70/0x200 [nvmecore] nvmfconnectioqueue+0x23e/0x2a0 [nvmefabrics] nvmeloopconnectioqueues+0x8d/0xb0 [nvmeloop] nvmeloopcreatectrl+0x58e/0x7d0 [nvmeloop] nvmfcreatectrl+0x1d7/0x4d0 [nvmefabrics] nvmfdevwrite+0xae/0x111 [nvmefabrics] vfswrite+0x144/0x560 ksyswrite+0xb7/0x140 __x64syswrite+0x42/0x50 dosyscall64+0x35/0x80 entrySYSCALL64afterhwframe+0x44/0xae

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49720.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
20e4d813931961fe26d26a1e98b3aba6ec00b130
Fixed
7fa28a7c3d74933a4fc22d341b60927952f31c19
Fixed
b5e65ef044d627effdc2599040b6d204e003f955
Fixed
b202a0bd2580ee5b0453772c46d464152fafff73
Fixed
14dc7a18abbe4176f5626c13c333670da8e06aa1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49720.json"