In the Linux kernel, the following vulnerability has been resolved:
scsi: mpi3mr: Fix memory leaks
Fix memory leaks related to operational reply queue's memory segments which are not getting freed while unloading the driver.
[ { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d44b5fefb22e139408ae12b864da1ecb9ad9d1d2", "target": { "file": "drivers/scsi/mpi3mr/mpi3mr_fw.c" }, "deprecated": false, "signature_version": "v1", "signature_type": "Line", "id": "CVE-2022-49126-15fb88dc", "digest": { "line_hashes": [ "111523050637697304987891062225213141383", "294441247104458365146348137590883312180", "251976707310425628814069580862365428149", "118245784993251875115316837805584465335" ], "threshold": 0.9 } }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@27fc9e90171ab0a94a411f3fdb3522ef5acb9537", "target": { "function": "mpi3mr_free_op_req_q_segments", "file": "drivers/scsi/mpi3mr/mpi3mr_fw.c" }, "deprecated": false, "signature_version": "v1", "signature_type": "Function", "id": "CVE-2022-49126-52b8fc55", "digest": { "length": 1001.0, "function_hash": "31130874161432417150313881285506344852" } }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@27fc9e90171ab0a94a411f3fdb3522ef5acb9537", "target": { "file": "drivers/scsi/mpi3mr/mpi3mr_fw.c" }, "deprecated": false, "signature_version": "v1", "signature_type": "Line", "id": "CVE-2022-49126-8d45ae46", "digest": { "line_hashes": [ "111523050637697304987891062225213141383", "294441247104458365146348137590883312180", "251976707310425628814069580862365428149", "118245784993251875115316837805584465335" ], "threshold": 0.9 } }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d76a88b8536d75ff5362e232097e85946b8aadf", "target": { "file": "drivers/scsi/mpi3mr/mpi3mr_fw.c" }, "deprecated": false, "signature_version": "v1", "signature_type": "Line", "id": "CVE-2022-49126-8f0558a0", "digest": { "line_hashes": [ "111523050637697304987891062225213141383", "294441247104458365146348137590883312180", "251976707310425628814069580862365428149", "118245784993251875115316837805584465335" ], "threshold": 0.9 } }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@71c7ac65a084ae7d387c3c1d02d59edfdecb009f", "target": { "function": "mpi3mr_free_op_req_q_segments", "file": "drivers/scsi/mpi3mr/mpi3mr_fw.c" }, "deprecated": false, "signature_version": "v1", "signature_type": "Function", "id": "CVE-2022-49126-9ac2c3db", "digest": { "length": 1001.0, "function_hash": "31130874161432417150313881285506344852" } }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d76a88b8536d75ff5362e232097e85946b8aadf", "target": { "function": "mpi3mr_free_op_req_q_segments", "file": "drivers/scsi/mpi3mr/mpi3mr_fw.c" }, "deprecated": false, "signature_version": "v1", "signature_type": "Function", "id": "CVE-2022-49126-a5978af6", "digest": { "length": 1001.0, "function_hash": "31130874161432417150313881285506344852" } }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@71c7ac65a084ae7d387c3c1d02d59edfdecb009f", "target": { "file": "drivers/scsi/mpi3mr/mpi3mr_fw.c" }, "deprecated": false, "signature_version": "v1", "signature_type": "Line", "id": "CVE-2022-49126-c0031313", "digest": { "line_hashes": [ "111523050637697304987891062225213141383", "294441247104458365146348137590883312180", "251976707310425628814069580862365428149", "118245784993251875115316837805584465335" ], "threshold": 0.9 } }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d44b5fefb22e139408ae12b864da1ecb9ad9d1d2", "target": { "function": "mpi3mr_free_op_req_q_segments", "file": "drivers/scsi/mpi3mr/mpi3mr_fw.c" }, "deprecated": false, "signature_version": "v1", "signature_type": "Function", "id": "CVE-2022-49126-d8fd4ede", "digest": { "length": 1001.0, "function_hash": "31130874161432417150313881285506344852" } } ]