Executive Summary

Informations
Name CVE-2022-48695 First vendor Publication 2024-05-03
Vendor Cve Last vendor Modification 2024-05-06

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Fix use-after-free warning

Fix the following use-after-free warning which is observed during controller reset:

refcount_t: underflow; use-after-free. WARNING: CPU: 23 PID: 5399 at lib/refcount.c:28 refcount_warn_saturate+0xa6/0xf0

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695

Sources (Detail)

https://git.kernel.org/stable/c/41acb064c4e013808bc7d5fc1b506fa449425b0b
https://git.kernel.org/stable/c/5682c94644fde72f72bded6580c38189ffc856b5
https://git.kernel.org/stable/c/6229fa494a5949be209bc73afbc5d0a749c2e3c7
https://git.kernel.org/stable/c/82efb917eeb27454dc4c6fe26432fc8f6c75bc16
https://git.kernel.org/stable/c/991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34
https://git.kernel.org/stable/c/b8fc9e91b931215110ba824d1a2983c5f60b6f82
https://git.kernel.org/stable/c/d4959d09b76eb7a4146f5133962b88d3bddb63d6
https://git.kernel.org/stable/c/ea10a652ad2ae2cf3eced6f632a5c98f26727057
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2024-05-06 17:27:27
  • Multiple Updates
2024-05-04 00:27:28
  • First insertion