Логотип exploitDog
bind: "CVE-2022-48792"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2022-48792"

Количество 24

Количество 24

ubuntu логотип

CVE-2022-48792

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task Currently a use-after-free may occur if a sas_task is aborted by the upper layer before we handle the I/O completion in mpi_ssp_completion() or mpi_sata_completion(). In this case, the following are the two steps in handling those I/O completions: - Call complete() to inform the upper layer handler of completion of the I/O. - Release driver resources associated with the sas_task in pm8001_ccb_task_free() call. When complete() is called, the upper layer may free the sas_task. As such, we should not touch the associated sas_task afterwards, but we do so in the pm8001_ccb_task_free() call. Fix by swapping the complete() and pm8001_ccb_task_free() calls ordering.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2022-48792

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task Currently a use-after-free may occur if a sas_task is aborted by the upper layer before we handle the I/O completion in mpi_ssp_completion() or mpi_sata_completion(). In this case, the following are the two steps in handling those I/O completions: - Call complete() to inform the upper layer handler of completion of the I/O. - Release driver resources associated with the sas_task in pm8001_ccb_task_free() call. When complete() is called, the upper layer may free the sas_task. As such, we should not touch the associated sas_task afterwards, but we do so in the pm8001_ccb_task_free() call. Fix by swapping the complete() and pm8001_ccb_task_free() calls ordering.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2022-48792

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task Currently a use-after-free may occur if a sas_task is aborted by the upper layer before we handle the I/O completion in mpi_ssp_completion() or mpi_sata_completion(). In this case, the following are the two steps in handling those I/O completions: - Call complete() to inform the upper layer handler of completion of the I/O. - Release driver resources associated with the sas_task in pm8001_ccb_task_free() call. When complete() is called, the upper layer may free the sas_task. As such, we should not touch the associated sas_task afterwards, but we do so in the pm8001_ccb_task_free() call. Fix by swapping the complete() and pm8001_ccb_task_free() calls ordering.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2022-48792

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: s ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-x9wp-3948-xg4x

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task Currently a use-after-free may occur if a sas_task is aborted by the upper layer before we handle the I/O completion in mpi_ssp_completion() or mpi_sata_completion(). In this case, the following are the two steps in handling those I/O completions: - Call complete() to inform the upper layer handler of completion of the I/O. - Release driver resources associated with the sas_task in pm8001_ccb_task_free() call. When complete() is called, the upper layer may free the sas_task. As such, we should not touch the associated sas_task afterwards, but we do so in the pm8001_ccb_task_free() call. Fix by swapping the complete() and pm8001_ccb_task_free() calls ordering.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2024-07755

больше 3 лет назад

Уязвимость функции mpi_ssp_completion() драйвера PMC-Sierra SPC 8001 SAS/SATA ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0944-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0904-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0893-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0942-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0908-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0892-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0943-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0898-1

5 месяцев назад

Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2923-1

12 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2948-1

12 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
redos логотип

ROS-20240822-01

12 месяцев назад

Множественные уязвимости kernel-lt

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2892-1

12 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2940-1

12 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2901-1

12 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-48792

In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task Currently a use-after-free may occur if a sas_task is aborted by the upper layer before we handle the I/O completion in mpi_ssp_completion() or mpi_sata_completion(). In this case, the following are the two steps in handling those I/O completions: - Call complete() to inform the upper layer handler of completion of the I/O. - Release driver resources associated with the sas_task in pm8001_ccb_task_free() call. When complete() is called, the upper layer may free the sas_task. As such, we should not touch the associated sas_task afterwards, but we do so in the pm8001_ccb_task_free() call. Fix by swapping the complete() and pm8001_ccb_task_free() calls ordering.

CVSS3: 7.8
0%
Низкий
около 1 года назад
redhat логотип
CVE-2022-48792

In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task Currently a use-after-free may occur if a sas_task is aborted by the upper layer before we handle the I/O completion in mpi_ssp_completion() or mpi_sata_completion(). In this case, the following are the two steps in handling those I/O completions: - Call complete() to inform the upper layer handler of completion of the I/O. - Release driver resources associated with the sas_task in pm8001_ccb_task_free() call. When complete() is called, the upper layer may free the sas_task. As such, we should not touch the associated sas_task afterwards, but we do so in the pm8001_ccb_task_free() call. Fix by swapping the complete() and pm8001_ccb_task_free() calls ordering.

CVSS3: 7.8
0%
Низкий
около 1 года назад
nvd логотип
CVE-2022-48792

In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task Currently a use-after-free may occur if a sas_task is aborted by the upper layer before we handle the I/O completion in mpi_ssp_completion() or mpi_sata_completion(). In this case, the following are the two steps in handling those I/O completions: - Call complete() to inform the upper layer handler of completion of the I/O. - Release driver resources associated with the sas_task in pm8001_ccb_task_free() call. When complete() is called, the upper layer may free the sas_task. As such, we should not touch the associated sas_task afterwards, but we do so in the pm8001_ccb_task_free() call. Fix by swapping the complete() and pm8001_ccb_task_free() calls ordering.

CVSS3: 7.8
0%
Низкий
около 1 года назад
debian логотип
CVE-2022-48792

In the Linux kernel, the following vulnerability has been resolved: s ...

CVSS3: 7.8
0%
Низкий
около 1 года назад
github логотип
GHSA-x9wp-3948-xg4x

In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task Currently a use-after-free may occur if a sas_task is aborted by the upper layer before we handle the I/O completion in mpi_ssp_completion() or mpi_sata_completion(). In this case, the following are the two steps in handling those I/O completions: - Call complete() to inform the upper layer handler of completion of the I/O. - Release driver resources associated with the sas_task in pm8001_ccb_task_free() call. When complete() is called, the upper layer may free the sas_task. As such, we should not touch the associated sas_task afterwards, but we do so in the pm8001_ccb_task_free() call. Fix by swapping the complete() and pm8001_ccb_task_free() calls ordering.

CVSS3: 7.8
0%
Низкий
около 1 года назад
fstec логотип
BDU:2024-07755

Уязвимость функции mpi_ssp_completion() драйвера PMC-Sierra SPC 8001 SAS/SATA ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2025:0944-1

Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0904-1

Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0893-1

Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0942-1

Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0908-1

Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0892-1

Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0943-1

Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0898-1

Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2923-1

Security update for the Linux Kernel

12 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2948-1

Security update for the Linux Kernel

12 месяцев назад
redos логотип
ROS-20240822-01

Множественные уязвимости kernel-lt

CVSS3: 7.8
12 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2892-1

Security update for the Linux Kernel

12 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2940-1

Security update for the Linux Kernel

12 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2901-1

Security update for the Linux Kernel

12 месяцев назад

Уязвимостей на страницу