CVE-2022-48792
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-48792 is a use-after-free vulnerability in the Linux kernel's SCSI subsystem, specifically in the pm8001 driver. The vulnerability was discovered in the handling of aborted SSP/STP sas_task operations. The issue affects Linux kernel versions up to (excluding) 5.10.102, versions from 5.11 up to (excluding) 5.15.25, and versions from 5.16 up to (excluding) 5.16.11 (NVD).

Technical details

The vulnerability occurs when a sastask is aborted by the upper layer before handling I/O completion in mpisspcompletion() or mpisatacompletion() functions. The issue arises from incorrect ordering of operations: first calling complete() to inform the upper layer handler of I/O completion, followed by releasing driver resources in pm8001ccbtaskfree(). When complete() is called, the upper layer may free the sastask, leading to a use-after-free condition when pm8001ccbtaskfree() attempts to access it afterward. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD, Kernel Patch).

Impact

This vulnerability could allow an attacker with local access to cause a use-after-free condition, potentially leading to privilege escalation, information disclosure, or system crashes. The high CVSS score indicates serious potential consequences affecting the confidentiality, integrity, and availability of the system (NVD).

Mitigation and workarounds

The vulnerability has been fixed by swapping the ordering of complete() and pm8001ccbtask_free() calls. Users should upgrade to Linux kernel versions 5.10.102, 5.15.25, 5.16.11 or later which contain the fix. The patch has been backported to multiple stable kernel branches (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40258HIGH7
  • Linux KernelLinux Kernel
  • kernel-zfcpdump-devel-matched
NoNoDec 04, 2025
CVE-2025-40259MEDIUM6.2
  • Linux KernelLinux Kernel
  • kernel-64k-devel
NoNoDec 04, 2025
CVE-2025-40264MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug-kvm
NoNoDec 04, 2025
CVE-2025-40254MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-modules-partner
NoNoDec 04, 2025
CVE-2025-40253MEDIUM5.5
  • Linux KernelLinux Kernel
  • python3-perf
NoNoDec 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management