In the Linux kernel, the following vulnerability has been resolved:
scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE
There is no corresponding free routine if lpfcsli4issuewqe fails to issue the CMF WQE in lpfcissuecmfsync_wqe.
If ret_val is non-zero, then free the iocbq request structure.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50027.json"
}[
{
"signature_version": "v1",
"digest": {
"function_hash": "148799809667048534083684806072533403707",
"length": 2702.0
},
"signature_type": "Function",
"target": {
"function": "lpfc_issue_cmf_sync_wqe",
"file": "drivers/scsi/lpfc/lpfc_sli.c"
},
"deprecated": false,
"id": "CVE-2022-50027-4e32cdff",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4eb7a1beff03836d3df271cd23b790884e3facb9"
},
{
"signature_version": "v1",
"digest": {
"function_hash": "166356371522529305791338562481559242607",
"length": 2696.0
},
"signature_type": "Function",
"target": {
"function": "lpfc_issue_cmf_sync_wqe",
"file": "drivers/scsi/lpfc/lpfc_sli.c"
},
"deprecated": false,
"id": "CVE-2022-50027-58239176",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9c8e2e607270a368834a0ef72aa82d970f89c596"
},
{
"signature_version": "v1",
"digest": {
"line_hashes": [
"39998803273306919104808196551910664149",
"334159374403899272221071056535900364893",
"299949554511843251367752123336348921659",
"231090360642749865709928657542116353357",
"110793512852871176460563250232317587725",
"159969509893140621040856082163442262842",
"327935810147015990078769896424413665717"
],
"threshold": 0.9
},
"signature_type": "Line",
"target": {
"file": "drivers/scsi/lpfc/lpfc_sli.c"
},
"deprecated": false,
"id": "CVE-2022-50027-5f78dc2b",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4eb7a1beff03836d3df271cd23b790884e3facb9"
},
{
"signature_version": "v1",
"digest": {
"function_hash": "148799809667048534083684806072533403707",
"length": 2702.0
},
"signature_type": "Function",
"target": {
"function": "lpfc_issue_cmf_sync_wqe",
"file": "drivers/scsi/lpfc/lpfc_sli.c"
},
"deprecated": false,
"id": "CVE-2022-50027-85b00af6",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2f67dc7970bce3529edce93a0a14234d88b3fcd5"
},
{
"signature_version": "v1",
"digest": {
"line_hashes": [
"39998803273306919104808196551910664149",
"334159374403899272221071056535900364893",
"299949554511843251367752123336348921659",
"231090360642749865709928657542116353357",
"110793512852871176460563250232317587725",
"159969509893140621040856082163442262842",
"327935810147015990078769896424413665717"
],
"threshold": 0.9
},
"signature_type": "Line",
"target": {
"file": "drivers/scsi/lpfc/lpfc_sli.c"
},
"deprecated": false,
"id": "CVE-2022-50027-97e32658",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2f67dc7970bce3529edce93a0a14234d88b3fcd5"
},
{
"signature_version": "v1",
"digest": {
"line_hashes": [
"39998803273306919104808196551910664149",
"334159374403899272221071056535900364893",
"299949554511843251367752123336348921659",
"231090360642749865709928657542116353357",
"110793512852871176460563250232317587725",
"159969509893140621040856082163442262842",
"327935810147015990078769896424413665717"
],
"threshold": 0.9
},
"signature_type": "Line",
"target": {
"file": "drivers/scsi/lpfc/lpfc_sli.c"
},
"deprecated": false,
"id": "CVE-2022-50027-ea9ae16e",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9c8e2e607270a368834a0ef72aa82d970f89c596"
}
]