In the Linux kernel, the following vulnerability has been resolved:
scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE
There is no corresponding free routine if lpfcsli4issuewqe fails to issue the CMF WQE in lpfcissuecmfsync_wqe.
If ret_val is non-zero, then free the iocbq request structure.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4eb7a1beff03836d3df271cd23b790884e3facb9",
"id": "CVE-2022-50027-4e32cdff",
"deprecated": false,
"target": {
"function": "lpfc_issue_cmf_sync_wqe",
"file": "drivers/scsi/lpfc/lpfc_sli.c"
},
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"length": 2702.0,
"function_hash": "148799809667048534083684806072533403707"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9c8e2e607270a368834a0ef72aa82d970f89c596",
"id": "CVE-2022-50027-58239176",
"deprecated": false,
"target": {
"function": "lpfc_issue_cmf_sync_wqe",
"file": "drivers/scsi/lpfc/lpfc_sli.c"
},
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"length": 2696.0,
"function_hash": "166356371522529305791338562481559242607"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4eb7a1beff03836d3df271cd23b790884e3facb9",
"id": "CVE-2022-50027-5f78dc2b",
"deprecated": false,
"target": {
"file": "drivers/scsi/lpfc/lpfc_sli.c"
},
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"39998803273306919104808196551910664149",
"334159374403899272221071056535900364893",
"299949554511843251367752123336348921659",
"231090360642749865709928657542116353357",
"110793512852871176460563250232317587725",
"159969509893140621040856082163442262842",
"327935810147015990078769896424413665717"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2f67dc7970bce3529edce93a0a14234d88b3fcd5",
"id": "CVE-2022-50027-85b00af6",
"deprecated": false,
"target": {
"function": "lpfc_issue_cmf_sync_wqe",
"file": "drivers/scsi/lpfc/lpfc_sli.c"
},
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"length": 2702.0,
"function_hash": "148799809667048534083684806072533403707"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2f67dc7970bce3529edce93a0a14234d88b3fcd5",
"id": "CVE-2022-50027-97e32658",
"deprecated": false,
"target": {
"file": "drivers/scsi/lpfc/lpfc_sli.c"
},
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"39998803273306919104808196551910664149",
"334159374403899272221071056535900364893",
"299949554511843251367752123336348921659",
"231090360642749865709928657542116353357",
"110793512852871176460563250232317587725",
"159969509893140621040856082163442262842",
"327935810147015990078769896424413665717"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9c8e2e607270a368834a0ef72aa82d970f89c596",
"id": "CVE-2022-50027-ea9ae16e",
"deprecated": false,
"target": {
"file": "drivers/scsi/lpfc/lpfc_sli.c"
},
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"39998803273306919104808196551910664149",
"334159374403899272221071056535900364893",
"299949554511843251367752123336348921659",
"231090360642749865709928657542116353357",
"110793512852871176460563250232317587725",
"159969509893140621040856082163442262842",
"327935810147015990078769896424413665717"
]
}
}
]