request->msgcode == FC_BSG_HST_ELS_NOLOGIN bsg_job->request->msgcode != FC_BSG_RPT_ELS but changed it to: bsg_job->request->msgcode == FC_BSG_RPT_ELS instead. Change the == to a != to avoid leaking the fcport structure or freeing unallocated memory. "> request->msgcode,==,FC_BSG_HST_ELS_NOLOGIN bsg_job->request->msgcode,!=,FC_BSG_RPT_ELS,but,changed,it,to: bsg_job->request->msgcode,==,FC_BSG_RPT_ELS,instead.,Change,the,==,to a,!=,to,avoid,leaking,the,fcport,structure,or,freeing,unallocated memory. "> SecuritySpace - CVE-2021-47473
 
 
 Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2021-47473
Description:In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() Commit 8c0eb596baa5 ("[SCSI] qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()"), intended to change: bsg_job->request->msgcode == FC_BSG_HST_ELS_NOLOGIN bsg_job->request->msgcode != FC_BSG_RPT_ELS but changed it to: bsg_job->request->msgcode == FC_BSG_RPT_ELS instead. Change the == to a != to avoid leaking the fcport structure or freeing unallocated memory.
Test IDs: None available
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2021-47473
https://git.kernel.org/stable/c/7fb223d0ad801f633c78cbe42b1d1b55f5d163ad
https://git.kernel.org/stable/c/7fb223d0ad801f633c78cbe42b1d1b55f5d163ad
https://git.kernel.org/stable/c/96f0aebf29be25254fa585af43924e34aa21fd9a
https://git.kernel.org/stable/c/96f0aebf29be25254fa585af43924e34aa21fd9a
https://git.kernel.org/stable/c/a7fbb56e6c941d9f59437b96412a348e66388d3e
https://git.kernel.org/stable/c/a7fbb56e6c941d9f59437b96412a348e66388d3e




© 1998-2025 E-Soft Inc. All rights reserved.