In the Linux kernel, the following vulnerability has been resolved:
scsi: mpi3mr: Fix memory leaks
Fix memory leaks related to operational reply queue's memory segments which are not getting freed while unloading the driver.
[
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d44b5fefb22e139408ae12b864da1ecb9ad9d1d2",
"id": "CVE-2022-49126-15fb88dc",
"signature_version": "v1",
"target": {
"file": "drivers/scsi/mpi3mr/mpi3mr_fw.c"
},
"signature_type": "Line",
"digest": {
"line_hashes": [
"111523050637697304987891062225213141383",
"294441247104458365146348137590883312180",
"251976707310425628814069580862365428149",
"118245784993251875115316837805584465335"
],
"threshold": 0.9
}
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@27fc9e90171ab0a94a411f3fdb3522ef5acb9537",
"id": "CVE-2022-49126-52b8fc55",
"signature_version": "v1",
"target": {
"function": "mpi3mr_free_op_req_q_segments",
"file": "drivers/scsi/mpi3mr/mpi3mr_fw.c"
},
"signature_type": "Function",
"digest": {
"function_hash": "31130874161432417150313881285506344852",
"length": 1001.0
}
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@27fc9e90171ab0a94a411f3fdb3522ef5acb9537",
"id": "CVE-2022-49126-8d45ae46",
"signature_version": "v1",
"target": {
"file": "drivers/scsi/mpi3mr/mpi3mr_fw.c"
},
"signature_type": "Line",
"digest": {
"line_hashes": [
"111523050637697304987891062225213141383",
"294441247104458365146348137590883312180",
"251976707310425628814069580862365428149",
"118245784993251875115316837805584465335"
],
"threshold": 0.9
}
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d76a88b8536d75ff5362e232097e85946b8aadf",
"id": "CVE-2022-49126-8f0558a0",
"signature_version": "v1",
"target": {
"file": "drivers/scsi/mpi3mr/mpi3mr_fw.c"
},
"signature_type": "Line",
"digest": {
"line_hashes": [
"111523050637697304987891062225213141383",
"294441247104458365146348137590883312180",
"251976707310425628814069580862365428149",
"118245784993251875115316837805584465335"
],
"threshold": 0.9
}
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@71c7ac65a084ae7d387c3c1d02d59edfdecb009f",
"id": "CVE-2022-49126-9ac2c3db",
"signature_version": "v1",
"target": {
"function": "mpi3mr_free_op_req_q_segments",
"file": "drivers/scsi/mpi3mr/mpi3mr_fw.c"
},
"signature_type": "Function",
"digest": {
"function_hash": "31130874161432417150313881285506344852",
"length": 1001.0
}
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d76a88b8536d75ff5362e232097e85946b8aadf",
"id": "CVE-2022-49126-a5978af6",
"signature_version": "v1",
"target": {
"function": "mpi3mr_free_op_req_q_segments",
"file": "drivers/scsi/mpi3mr/mpi3mr_fw.c"
},
"signature_type": "Function",
"digest": {
"function_hash": "31130874161432417150313881285506344852",
"length": 1001.0
}
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@71c7ac65a084ae7d387c3c1d02d59edfdecb009f",
"id": "CVE-2022-49126-c0031313",
"signature_version": "v1",
"target": {
"file": "drivers/scsi/mpi3mr/mpi3mr_fw.c"
},
"signature_type": "Line",
"digest": {
"line_hashes": [
"111523050637697304987891062225213141383",
"294441247104458365146348137590883312180",
"251976707310425628814069580862365428149",
"118245784993251875115316837805584465335"
],
"threshold": 0.9
}
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d44b5fefb22e139408ae12b864da1ecb9ad9d1d2",
"id": "CVE-2022-49126-d8fd4ede",
"signature_version": "v1",
"target": {
"function": "mpi3mr_free_op_req_q_segments",
"file": "drivers/scsi/mpi3mr/mpi3mr_fw.c"
},
"signature_type": "Function",
"digest": {
"function_hash": "31130874161432417150313881285506344852",
"length": 1001.0
}
}
]