CVE-2022-49521

Source
https://cve.org/CVERecord?id=CVE-2022-49521
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49521.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49521
Downstream
Related
Published
2025-02-26T02:13:46.812Z
Modified
2026-04-11T12:44:10.547055Z
Summary
scsi: lpfc: Fix resource leak in lpfc_sli4_send_seq_to_ulp()
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix resource leak in lpfcsli4sendseqto_ulp()

If no handler is found in lpfccompleteunsol_iocb() to match the rctl of a received frame, the frame is dropped and resources are leaked.

Fix by returning resources when discarding an unhandled frame type. Update lpfcfcframe_check() handling of NOP basic link service.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49521.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4f774513f7b3fe96648b8936f60f835e6ceaa88e
Fixed
fa1b509d41c5433672f72c0615cf4aefa0611c99
Fixed
40cf4ea4d2d497f7732c87d350ba5c3f5e8a43a1
Fixed
08709769ff2fb6c5ffedcda3742700d8ea1618a8
Fixed
7860d8f8082605b57596aa82d3d438c1fdad9a9e
Fixed
646db1a560f44236b7278b822ca99a1d3b6ea72c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49521.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.31
Fixed
5.10.121
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.46
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.17.14
Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
5.18.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49521.json"