
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-48858 affects the Linux kernel's net/mlx5 driver. The vulnerability was discovered in February 2022 and involves a race condition in the command flush flow that can lead to a use-after-free condition (Kernel Commit).
The vulnerability occurs when one command releases its last refcount and frees its index and entry while another process running command flush flow takes refcount to this command entry. The process handling commands flush may see this command as needing to be flushed if the other process released its refcount but hasn't released the index yet, leading to a use-after-free condition (Kernel Commit).
This vulnerability can result in a use-after-free condition in the kernel's MLX5 driver, potentially leading to system instability or crashes. The issue manifests as a refcount warning indicating memory corruption (Kernel Commit).
The issue has been fixed by adding proper spin lock protection in the command entry handling code. The fix involves modifying the cmdfreeindex and cmdentput functions to ensure proper synchronization of the command entry lifecycle (Kernel Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."