![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2022-48666 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
scsi: core: Fix a use-after-free There are two .exit_cmd_priv
implementations. Both implementations use resources associated with
the SCSI host. Make sure that these resources are still available when
.exit_cmd_priv is called by waiting inside scsi_remove_host() until
the tag set has been freed. This commit fixes the following use-after-
free:
==================================================================
BUG: KASAN: use-after-free in srp_exit_cmd_priv+0x27/0xd0 [ib_srp]
Read of size 8 at addr ffff888100337000 by task multipathd/16727 Call
Trace: |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-48666 https://git.kernel.org/stable/c/2e7eb4c1e8af8385de22775bd0be552f59b28c9a https://git.kernel.org/stable/c/2e7eb4c1e8af8385de22775bd0be552f59b28c9a https://git.kernel.org/stable/c/8fe4ce5836e932f5766317cb651c1ff2a4cd0506 https://git.kernel.org/stable/c/8fe4ce5836e932f5766317cb651c1ff2a4cd0506 |