Количество 22
Количество 22

CVE-2022-48791
In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted TMF sas_task Currently a use-after-free may occur if a TMF sas_task is aborted before we handle the IO completion in mpi_ssp_completion(). The abort occurs due to timeout. When the timeout occurs, the SAS_TASK_STATE_ABORTED flag is set and the sas_task is freed in pm8001_exec_internal_tmf_task(). However, if the I/O completion occurs later, the I/O completion still thinks that the sas_task is available. Fix this by clearing the ccb->task if the TMF times out - the I/O completion handler does nothing if this pointer is cleared.

CVE-2022-48791
In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted TMF sas_task Currently a use-after-free may occur if a TMF sas_task is aborted before we handle the IO completion in mpi_ssp_completion(). The abort occurs due to timeout. When the timeout occurs, the SAS_TASK_STATE_ABORTED flag is set and the sas_task is freed in pm8001_exec_internal_tmf_task(). However, if the I/O completion occurs later, the I/O completion still thinks that the sas_task is available. Fix this by clearing the ccb->task if the TMF times out - the I/O completion handler does nothing if this pointer is cleared.

CVE-2022-48791
In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted TMF sas_task Currently a use-after-free may occur if a TMF sas_task is aborted before we handle the IO completion in mpi_ssp_completion(). The abort occurs due to timeout. When the timeout occurs, the SAS_TASK_STATE_ABORTED flag is set and the sas_task is freed in pm8001_exec_internal_tmf_task(). However, if the I/O completion occurs later, the I/O completion still thinks that the sas_task is available. Fix this by clearing the ccb->task if the TMF times out - the I/O completion handler does nothing if this pointer is cleared.
CVE-2022-48791
In the Linux kernel, the following vulnerability has been resolved: s ...

SUSE-SU-2025:1092-1
Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5)
GHSA-hrwc-pg2q-pgc2
In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted TMF sas_task Currently a use-after-free may occur if a TMF sas_task is aborted before we handle the IO completion in mpi_ssp_completion(). The abort occurs due to timeout. When the timeout occurs, the SAS_TASK_STATE_ABORTED flag is set and the sas_task is freed in pm8001_exec_internal_tmf_task(). However, if the I/O completion occurs later, the I/O completion still thinks that the sas_task is available. Fix this by clearing the ccb->task if the TMF times out - the I/O completion handler does nothing if this pointer is cleared.

BDU:2024-06525
Уязвимость функции pm8001_exec_internal_tmf_task() драйвера PMC-Sierra SPC 8001 SAS/SATA ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

SUSE-SU-2025:1088-1
Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

SUSE-SU-2025:1139-1
Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)

SUSE-SU-2025:1123-1
Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3)

SUSE-SU-2025:1119-1
Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3)

SUSE-SU-2024:3467-1
Security update for the Linux Kernel

SUSE-SU-2024:3499-1
Security update for the Linux Kernel

ROS-20240816-12
Множественные уязвимости kernel-lt

SUSE-SU-2024:3249-1
Security update for the Linux Kernel

SUSE-SU-2024:3591-1
Security update for the Linux Kernel

SUSE-SU-2024:3559-1
Security update for the Linux Kernel

SUSE-SU-2024:3566-1
Security update for the Linux Kernel

SUSE-SU-2024:2929-1
Security update for the Linux Kernel

SUSE-SU-2024:2947-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2022-48791 In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted TMF sas_task Currently a use-after-free may occur if a TMF sas_task is aborted before we handle the IO completion in mpi_ssp_completion(). The abort occurs due to timeout. When the timeout occurs, the SAS_TASK_STATE_ABORTED flag is set and the sas_task is freed in pm8001_exec_internal_tmf_task(). However, if the I/O completion occurs later, the I/O completion still thinks that the sas_task is available. Fix this by clearing the ccb->task if the TMF times out - the I/O completion handler does nothing if this pointer is cleared. | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад |
![]() | CVE-2022-48791 In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted TMF sas_task Currently a use-after-free may occur if a TMF sas_task is aborted before we handle the IO completion in mpi_ssp_completion(). The abort occurs due to timeout. When the timeout occurs, the SAS_TASK_STATE_ABORTED flag is set and the sas_task is freed in pm8001_exec_internal_tmf_task(). However, if the I/O completion occurs later, the I/O completion still thinks that the sas_task is available. Fix this by clearing the ccb->task if the TMF times out - the I/O completion handler does nothing if this pointer is cleared. | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад |
![]() | CVE-2022-48791 In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted TMF sas_task Currently a use-after-free may occur if a TMF sas_task is aborted before we handle the IO completion in mpi_ssp_completion(). The abort occurs due to timeout. When the timeout occurs, the SAS_TASK_STATE_ABORTED flag is set and the sas_task is freed in pm8001_exec_internal_tmf_task(). However, if the I/O completion occurs later, the I/O completion still thinks that the sas_task is available. Fix this by clearing the ccb->task if the TMF times out - the I/O completion handler does nothing if this pointer is cleared. | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад |
CVE-2022-48791 In the Linux kernel, the following vulnerability has been resolved: s ... | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад | |
![]() | SUSE-SU-2025:1092-1 Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5) | 0% Низкий | 3 месяца назад | |
GHSA-hrwc-pg2q-pgc2 In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted TMF sas_task Currently a use-after-free may occur if a TMF sas_task is aborted before we handle the IO completion in mpi_ssp_completion(). The abort occurs due to timeout. When the timeout occurs, the SAS_TASK_STATE_ABORTED flag is set and the sas_task is freed in pm8001_exec_internal_tmf_task(). However, if the I/O completion occurs later, the I/O completion still thinks that the sas_task is available. Fix this by clearing the ccb->task if the TMF times out - the I/O completion handler does nothing if this pointer is cleared. | CVSS3: 7.8 | 0% Низкий | 11 месяцев назад | |
![]() | BDU:2024-06525 Уязвимость функции pm8001_exec_internal_tmf_task() драйвера PMC-Sierra SPC 8001 SAS/SATA ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад |
![]() | SUSE-SU-2025:1088-1 Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) | 3 месяца назад | ||
![]() | SUSE-SU-2025:1139-1 Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) | 3 месяца назад | ||
![]() | SUSE-SU-2025:1123-1 Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3) | 3 месяца назад | ||
![]() | SUSE-SU-2025:1119-1 Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3) | 3 месяца назад | ||
![]() | SUSE-SU-2024:3467-1 Security update for the Linux Kernel | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3499-1 Security update for the Linux Kernel | 9 месяцев назад | ||
![]() | ROS-20240816-12 Множественные уязвимости kernel-lt | CVSS3: 9.8 | 10 месяцев назад | |
![]() | SUSE-SU-2024:3249-1 Security update for the Linux Kernel | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3591-1 Security update for the Linux Kernel | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3559-1 Security update for the Linux Kernel | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3566-1 Security update for the Linux Kernel | 8 месяцев назад | ||
![]() | SUSE-SU-2024:2929-1 Security update for the Linux Kernel | 10 месяцев назад | ||
![]() | SUSE-SU-2024:2947-1 Security update for the Linux Kernel | 10 месяцев назад |
Уязвимостей на страницу