{"id":"CVE-2022-50727","summary":"scsi: efct: Fix possible memleak in efct_device_init()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: efct: Fix possible memleak in efct_device_init()\n\nIn efct_device_init(), when efct_scsi_reg_fc_transport() fails,\nefct_scsi_tgt_driver_exit() is not called to release memory for\nefct_scsi_tgt_driver_init() and causes memleak:\n\nunreferenced object 0xffff8881020ce000 (size 2048):\n  comm \"modprobe\", pid 465, jiffies 4294928222 (age 55.872s)\n  backtrace:\n    [\u003c0000000021a1ef1b\u003e] kmalloc_trace+0x27/0x110\n    [\u003c000000004c3ed51c\u003e] target_register_template+0x4fd/0x7b0 [target_core_mod]\n    [\u003c00000000f3393296\u003e] efct_scsi_tgt_driver_init+0x18/0x50 [efct]\n    [\u003c00000000115de533\u003e] 0xffffffffc0d90011\n    [\u003c00000000d608f646\u003e] do_one_initcall+0xd0/0x4e0\n    [\u003c0000000067828cf1\u003e] do_init_module+0x1cc/0x6a0\n    ...","modified":"2026-03-20T12:22:37.312592Z","published":"2025-12-24T12:22:48.315Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50727.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/038359eeccffaf0de4c1c9c51ee19cc5649619a1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0c6e6bb30229b1297ac0fd7ede2941d2322fc736"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bb0cd225dd37df1f4a22e36dad59ff33178ecdfc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c7e96168a8ca3be96c4959475164bef31115f07e"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50727.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50727"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4df84e8466242de835416a4ec0c856c0e2ed26eb"},{"fixed":"038359eeccffaf0de4c1c9c51ee19cc5649619a1"},{"fixed":"0c6e6bb30229b1297ac0fd7ede2941d2322fc736"},{"fixed":"c7e96168a8ca3be96c4959475164bef31115f07e"},{"fixed":"bb0cd225dd37df1f4a22e36dad59ff33178ecdfc"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50727.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.14.0"},{"fixed":"5.15.86"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.1.0"},{"fixed":"6.1.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50727.json"}}],"schema_version":"1.7.5"}