CVE-2022-48695

Source
https://cve.org/CVERecord?id=CVE-2022-48695
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48695.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-48695
Downstream
Related
Published
2024-05-03T17:44:55.829Z
Modified
2026-03-14T11:55:44.235997Z
Summary
scsi: mpt3sas: Fix use-after-free warning
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Fix use-after-free warning

Fix the following use-after-free warning which is observed during controller reset:

refcountt: underflow; use-after-free. WARNING: CPU: 23 PID: 5399 at lib/refcount.c:28 refcountwarn_saturate+0xa6/0xf0

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48695.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
146b16c8071f5f6c67895d15beeee1163f5107c4
Fixed
b8fc9e91b931215110ba824d1a2983c5f60b6f82
Fixed
d4959d09b76eb7a4146f5133962b88d3bddb63d6
Fixed
82efb917eeb27454dc4c6fe26432fc8f6c75bc16
Fixed
5682c94644fde72f72bded6580c38189ffc856b5
Fixed
ea10a652ad2ae2cf3eced6f632a5c98f26727057
Fixed
6229fa494a5949be209bc73afbc5d0a749c2e3c7
Fixed
41acb064c4e013808bc7d5fc1b506fa449425b0b
Fixed
991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48695.json"