CVE-2022-49114

Source
https://cve.org/CVERecord?id=CVE-2022-49114
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49114.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49114
Downstream
Related
Published
2025-02-26T01:54:58.172Z
Modified
2026-03-20T12:22:10.846261Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
scsi: libfc: Fix use after free in fc_exch_abts_resp()
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: libfc: Fix use after free in fcexchabts_resp()

fcexchrelease(ep) will decrease the ep's reference count. When the reference count reaches zero, it is freed. But ep is still used in the following code, which will lead to a use after free.

Return after the fcexchrelease() call to avoid use after free.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49114.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
42e9a92fe6a9095bd68a379aaec7ad2be0337f7a
Fixed
4a131d4ea8b581ac9b01d3a72754db4848be3232
Fixed
499d198494e77b6533251b9b909baf5c101129cb
Fixed
6044ad64f41c87382cfeeca281573d1886d80cbe
Fixed
5cf2ce8967b0d98c8cfa4dc42ef4fcf080f5c836
Fixed
1d7effe5fff9d28e45e18ac3a564067c7ddfe898
Fixed
f581df412bc45c95176e3c808ee2839c05b2ab0c
Fixed
87909291762d08fdb60d19069d7a89b5b308d0ef
Fixed
412dd8299b02e4410fe77b8396953c1a8dde183a
Fixed
271add11994ba1a334859069367e04d2be2ebdd4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49114.json"