{"id":"CVE-2022-48695","summary":"scsi: mpt3sas: Fix use-after-free warning","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix use-after-free warning\n\nFix the following use-after-free warning which is observed during\ncontroller reset:\n\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 23 PID: 5399 at lib/refcount.c:28 refcount_warn_saturate+0xa6/0xf0","modified":"2026-04-02T08:26:52.416221Z","published":"2024-05-03T17:44:55.829Z","related":["SUSE-SU-2024:1642-1","SUSE-SU-2024:1643-1","SUSE-SU-2024:1644-1","SUSE-SU-2024:1645-1","SUSE-SU-2024:1646-1","SUSE-SU-2024:1659-1","SUSE-SU-2024:1663-1","SUSE-SU-2024:1870-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2189-1","SUSE-SU-2025:0231-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48695.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/41acb064c4e013808bc7d5fc1b506fa449425b0b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5682c94644fde72f72bded6580c38189ffc856b5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6229fa494a5949be209bc73afbc5d0a749c2e3c7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/82efb917eeb27454dc4c6fe26432fc8f6c75bc16"},{"type":"WEB","url":"https://git.kernel.org/stable/c/991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b8fc9e91b931215110ba824d1a2983c5f60b6f82"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d4959d09b76eb7a4146f5133962b88d3bddb63d6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ea10a652ad2ae2cf3eced6f632a5c98f26727057"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48695.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48695"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"146b16c8071f5f6c67895d15beeee1163f5107c4"},{"fixed":"b8fc9e91b931215110ba824d1a2983c5f60b6f82"},{"fixed":"d4959d09b76eb7a4146f5133962b88d3bddb63d6"},{"fixed":"82efb917eeb27454dc4c6fe26432fc8f6c75bc16"},{"fixed":"5682c94644fde72f72bded6580c38189ffc856b5"},{"fixed":"ea10a652ad2ae2cf3eced6f632a5c98f26727057"},{"fixed":"6229fa494a5949be209bc73afbc5d0a749c2e3c7"},{"fixed":"41acb064c4e013808bc7d5fc1b506fa449425b0b"},{"fixed":"991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48695.json"}}],"schema_version":"1.7.5"}