CVE-2024-35930

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() The call to lpfc_sli4_resume_rpi() in lpfc_rcv_padisc() may return an unsuccessful status. In such cases, the elsiocb is not issued, the completion is not called, and thus the elsiocb resource is leaked. Check return value after calling lpfc_sli4_resume_rpi() and conditionally release the elsiocb resource.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

30 Dec 2024, 19:52

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/07a2aa674fca679316b8ac51440adb895b53a7cf - () https://git.kernel.org/stable/c/07a2aa674fca679316b8ac51440adb895b53a7cf - Patch
References () https://git.kernel.org/stable/c/2ae917d4bcab80ab304b774d492e2fcd6c52c06b - () https://git.kernel.org/stable/c/2ae917d4bcab80ab304b774d492e2fcd6c52c06b - Patch
References () https://git.kernel.org/stable/c/3320126ed3afbc11934502319b340f91a4d61c8f - () https://git.kernel.org/stable/c/3320126ed3afbc11934502319b340f91a4d61c8f - Patch
References () https://git.kernel.org/stable/c/7849e6f8410da96384e3d1f6b6d730f095142dc7 - () https://git.kernel.org/stable/c/7849e6f8410da96384e3d1f6b6d730f095142dc7 - Patch
References () https://git.kernel.org/stable/c/c473288f27d15014447de5a891bdf22a0695847a - () https://git.kernel.org/stable/c/c473288f27d15014447de5a891bdf22a0695847a - Patch
References () https://git.kernel.org/stable/c/e2cd32435b1dff3d63759476a3abc878e02fb6c8 - () https://git.kernel.org/stable/c/e2cd32435b1dff3d63759476a3abc878e02fb6c8 - Patch
References () https://git.kernel.org/stable/c/edf82aa7e9eb864a09229392054d131b34a5c9e8 - () https://git.kernel.org/stable/c/edf82aa7e9eb864a09229392054d131b34a5c9e8 - Patch
References () https://git.kernel.org/stable/c/ee0b5f96b6d66a1e6698228dcb41df11ec7f352f - () https://git.kernel.org/stable/c/ee0b5f96b6d66a1e6698228dcb41df11ec7f352f - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-401
First Time Debian
Linux linux Kernel
Debian debian Linux
Linux
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Information

Published : 2024-05-19 11:15

Updated : 2024-12-30 19:52


NVD link : CVE-2024-35930

Mitre link : CVE-2024-35930

CVE.ORG link : CVE-2024-35930


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-401

Missing Release of Memory after Effective Lifetime