{"id":"CVE-2022-50646","summary":"scsi: hpsa: Fix possible memory leak in hpsa_init_one()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: hpsa: Fix possible memory leak in hpsa_init_one()\n\nThe hpda_alloc_ctlr_info() allocates h and its field reply_map. However, in\nhpsa_init_one(), if alloc_percpu() failed, the hpsa_init_one() jumps to\nclean1 directly, which frees h and leaks the h-\u003ereply_map.\n\nFix by calling hpda_free_ctlr_info() to release h-\u003ereplay_map and h instead\nfree h directly.","modified":"2026-04-02T08:28:41.002340Z","published":"2025-12-09T00:00:20.596Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0316-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0350-1","SUSE-SU-2026:0369-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50646.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0aa7be66168b1e84b2581ffff3ccb54a6c804a1e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9c9ff300e0de07475796495d86f449340d454a0c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bfe10a1d9fbccdf39f8449d62509f070d8aaaac1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c808edbf580bfc454671cbe66e9d7c2e938e7601"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f4d1c14e8b404766ff2bb8644bb19443d73965de"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f8fc2f18652917cdcc89cb23f3a1b7cb6e119c5e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fc998d0a7d65672f0812f11cd0ec4bbe4f8f8507"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50646.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50646"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"8b834bff1b73dce46f4e9f5e84af6f73fed8b0ef"},{"fixed":"f4d1c14e8b404766ff2bb8644bb19443d73965de"},{"fixed":"f8fc2f18652917cdcc89cb23f3a1b7cb6e119c5e"},{"fixed":"c808edbf580bfc454671cbe66e9d7c2e938e7601"},{"fixed":"bfe10a1d9fbccdf39f8449d62509f070d8aaaac1"},{"fixed":"fc998d0a7d65672f0812f11cd0ec4bbe4f8f8507"},{"fixed":"0aa7be66168b1e84b2581ffff3ccb54a6c804a1e"},{"fixed":"9c9ff300e0de07475796495d86f449340d454a0c"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"1edd825c11f8ed2c409d6fb6b3d90a042cbf738d"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50646.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.16.0"},{"fixed":"4.19.270"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.229"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.163"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.86"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.1.0"},{"fixed":"6.1.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50646.json"}}],"schema_version":"1.7.5"}