CVE-2022-49114
26.02.2025, 07:00
In the Linux kernel, the following vulnerability has been resolved: scsi: libfc: Fix use after free in fc_exch_abts_resp() fc_exch_release(ep) will decrease the ep's reference count. When the reference count reaches zero, it is freed. But ep is still used in the following code, which will lead to a use after free. Return after the fc_exch_release() call to avoid use after free.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 𝑥 < 4.9.311 |
linux | linux_kernel | 4.10 ≤ 𝑥 < 4.14.276 |
linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.238 |
linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.189 |
linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.111 |
linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.34 |
linux | linux_kernel | 5.16 ≤ 𝑥 < 5.16.20 |
linux | linux_kernel | 5.17 ≤ 𝑥 < 5.17.3 |
𝑥
= Vulnerable software versions

Debian Releases
Common Weakness Enumeration
References