vulnerability
Ubuntu: (CVE-2022-50727): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Dec 24, 2025 | Jan 6, 2026 | Jan 7, 2026 |
Description
In the Linux kernel, the following vulnerability has been resolved: scsi: efct: Fix possible memleak in efct_device_init() In efct_device_init(), when efct_scsi_reg_fc_transport() fails, efct_scsi_tgt_driver_exit() is not called to release memory for efct_scsi_tgt_driver_init() and causes memleak: unreferenced object 0xffff8881020ce000 (size 2048): comm "modprobe", pid 465, jiffies 4294928222 (age 55.872s) backtrace: [<0000000021a1ef1b>] kmalloc_trace+0x27/0x110 [<000000004c3ed51c>] target_register_template+0x4fd/0x7b0 [target_core_mod] [<00000000f3393296>] efct_scsi_tgt_driver_init+0x18/0x50 [efct] [<00000000115de533>] 0xffffffffc0d90011 [<00000000d608f646>] do_one_initcall+0xd0/0x4e0 [<0000000067828cf1>] do_init_module+0x1cc/0x6a0 ...
Solutions
References
- CVE-2022-50727
- https://attackerkb.com/topics/CVE-2022-50727
- URL-https://git.kernel.org/stable/c/038359eeccffaf0de4c1c9c51ee19cc5649619a1
- URL-https://git.kernel.org/stable/c/0c6e6bb30229b1297ac0fd7ede2941d2322fc736
- URL-https://git.kernel.org/stable/c/bb0cd225dd37df1f4a22e36dad59ff33178ecdfc
- URL-https://git.kernel.org/stable/c/c7e96168a8ca3be96c4959475164bef31115f07e
- URL-https://www.cve.org/CVERecord?id=CVE-2022-50727
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.