{"schema_version":"1.7.2","id":"OESA-2026-1074","modified":"2026-01-16T11:57:41Z","published":"2026-01-16T11:57:41Z","upstream":["CVE-2022-50646"],"summary":"kernel security update","details":"The Linux Kernel, the operating system core itself.\r\n\r\nSecurity Fix(es):\n\nIn the Linux kernel, the following vulnerability has been resolved:\n\nscsi: hpsa: Fix possible memory leak in hpsa_init_one()\n\nThe hpda_alloc_ctlr_info() allocates h and its field reply_map. However, in\nhpsa_init_one(), if alloc_percpu() failed, the hpsa_init_one() jumps to\nclean1 directly, which frees h and leaks the h-&gt;reply_map.\n\nFix by calling hpda_free_ctlr_info() to release h-&gt;replay_map and h instead\nfree h directly.(CVE-2022-50646)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP4","name":"kernel","purl":"pkg:rpm/openEuler/kernel&distro=openEuler-20.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.19.90-2601.3.0.0358.oe2003sp4"}]}],"ecosystem_specific":{"aarch64":["bpftool-4.19.90-2601.3.0.0358.oe2003sp4.aarch64.rpm","bpftool-debuginfo-4.19.90-2601.3.0.0358.oe2003sp4.aarch64.rpm","kernel-4.19.90-2601.3.0.0358.oe2003sp4.aarch64.rpm","kernel-debuginfo-4.19.90-2601.3.0.0358.oe2003sp4.aarch64.rpm","kernel-debugsource-4.19.90-2601.3.0.0358.oe2003sp4.aarch64.rpm","kernel-devel-4.19.90-2601.3.0.0358.oe2003sp4.aarch64.rpm","kernel-source-4.19.90-2601.3.0.0358.oe2003sp4.aarch64.rpm","kernel-tools-4.19.90-2601.3.0.0358.oe2003sp4.aarch64.rpm","kernel-tools-debuginfo-4.19.90-2601.3.0.0358.oe2003sp4.aarch64.rpm","kernel-tools-devel-4.19.90-2601.3.0.0358.oe2003sp4.aarch64.rpm","perf-4.19.90-2601.3.0.0358.oe2003sp4.aarch64.rpm","perf-debuginfo-4.19.90-2601.3.0.0358.oe2003sp4.aarch64.rpm","python2-perf-4.19.90-2601.3.0.0358.oe2003sp4.aarch64.rpm","python2-perf-debuginfo-4.19.90-2601.3.0.0358.oe2003sp4.aarch64.rpm","python3-perf-4.19.90-2601.3.0.0358.oe2003sp4.aarch64.rpm","python3-perf-debuginfo-4.19.90-2601.3.0.0358.oe2003sp4.aarch64.rpm"],"src":["kernel-4.19.90-2601.3.0.0358.oe2003sp4.src.rpm"],"x86_64":["bpftool-4.19.90-2601.3.0.0358.oe2003sp4.x86_64.rpm","bpftool-debuginfo-4.19.90-2601.3.0.0358.oe2003sp4.x86_64.rpm","kernel-4.19.90-2601.3.0.0358.oe2003sp4.x86_64.rpm","kernel-debuginfo-4.19.90-2601.3.0.0358.oe2003sp4.x86_64.rpm","kernel-debugsource-4.19.90-2601.3.0.0358.oe2003sp4.x86_64.rpm","kernel-devel-4.19.90-2601.3.0.0358.oe2003sp4.x86_64.rpm","kernel-source-4.19.90-2601.3.0.0358.oe2003sp4.x86_64.rpm","kernel-tools-4.19.90-2601.3.0.0358.oe2003sp4.x86_64.rpm","kernel-tools-debuginfo-4.19.90-2601.3.0.0358.oe2003sp4.x86_64.rpm","kernel-tools-devel-4.19.90-2601.3.0.0358.oe2003sp4.x86_64.rpm","perf-4.19.90-2601.3.0.0358.oe2003sp4.x86_64.rpm","perf-debuginfo-4.19.90-2601.3.0.0358.oe2003sp4.x86_64.rpm","python2-perf-4.19.90-2601.3.0.0358.oe2003sp4.x86_64.rpm","python2-perf-debuginfo-4.19.90-2601.3.0.0358.oe2003sp4.x86_64.rpm","python3-perf-4.19.90-2601.3.0.0358.oe2003sp4.x86_64.rpm","python3-perf-debuginfo-4.19.90-2601.3.0.0358.oe2003sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1074"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50646"}],"database_specific":{"severity":"Medium"}}
