CVSS: 5.5EPSS: 0%CPEs: 7EXPL: 0CVE-2022-50653 – mmc: atmel-mci: fix return value check of mmc_add_host()
https://notcve.org/view.php?id=CVE-2022-50653
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: mmc: atmel-mci: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, it will lead two issues: 1. The memory that allocated in mmc_alloc_host() is leaked. 2. In the remove() path, mmc_remove_host() will be called to delete device, but it's not added yet, it will lead a kernel crash because of null-ptr-deref in device_del(). So fix this by checking the return value and calling mmc_free_host(... • https://git.kernel.org/stable/c/7d2be0749a59096a334c94dc48f43294193cb8ed •
CVSS: 6.6EPSS: 0%CPEs: 11EXPL: 0CVE-2022-50652 – uio: uio_dmem_genirq: Fix missing unlock in irq configuration
https://notcve.org/view.php?id=CVE-2022-50652
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: uio: uio_dmem_genirq: Fix missing unlock in irq configuration Commit b74351287d4b ("uio: fix a sleep-in-atomic-context bug in uio_dmem_genirq_irqcontrol()") started calling disable_irq() without holding the spinlock because it can sleep. However, that fix introduced another bug: if interrupt is already disabled and a new disable request comes in, then the spinlock is not unlocked: root@localhost:~# printf '\x00\x00\x00\x00' > /dev/uio0 root... • https://git.kernel.org/stable/c/b77fa964ecb1d72a671234f5bea95b41f77c233a •
CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0CVE-2022-50651 – ethtool: eeprom: fix null-deref on genl_info in dump
https://notcve.org/view.php?id=CVE-2022-50651
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: ethtool: eeprom: fix null-deref on genl_info in dump The similar fix as commit 46cdedf2a0fa ("ethtool: pse-pd: fix null-deref on genl_info in dump") is also needed for ethtool eeprom. In the Linux kernel, the following vulnerability has been resolved: ethtool: eeprom: fix null-deref on genl_info in dump The similar fix as commit 46cdedf2a0fa ("ethtool: pse-pd: fix null-deref on genl_info in dump") is also needed for ethtool eeprom. • https://git.kernel.org/stable/c/c781ff12a2f37a9795e13bf328e5053d3e69f9e0 •
CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0CVE-2022-50650 – bpf: Fix reference state management for synchronous callbacks
https://notcve.org/view.php?id=CVE-2022-50650
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: bpf: Fix reference state management for synchronous callbacks Currently, verifier verifies callback functions (sync and async) as if they will be executed once, (i.e. it explores execution state as if the function was being called once). The next insn to explore is set to start of subprog and the exit from nested frame is handled using curframe > 0 and prepare_func_exit. In case of async callback it uses a customized variant of push_stack s... • https://git.kernel.org/stable/c/69c087ba6225b574afb6e505b72cb75242a3d844 •
CVSS: 8.5EPSS: 0%CPEs: 7EXPL: 0CVE-2022-50649 – power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type()
https://notcve.org/view.php?id=CVE-2022-50649
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type() ADP5061_CHG_STATUS_1_CHG_STATUS is masked with 0x07, which means a length of 8, but adp5061_chg_type array size is 4, may end up reading 4 elements beyond the end of the adp5061_chg_type[] array. In the Linux kernel, the following vulnerability has been resolved: power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type() ADP5061_CHG_STATUS_1_CHG_STATUS is... • https://git.kernel.org/stable/c/24a0be36e9a21f63de2e6088607e689e59ec15f4 •
CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0CVE-2022-50648 – ftrace: Fix recursive locking direct_mutex in ftrace_modify_direct_caller
https://notcve.org/view.php?id=CVE-2022-50648
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix recursive locking direct_mutex in ftrace_modify_direct_caller Naveen reported recursive locking of direct_mutex with sample ftrace-direct-modify.ko: [ 74.762406] WARNING: possible recursive locking detected [ 74.762887] 6.0.0-rc6+ #33 Not tainted [ 74.763216] -------------------------------------------- [ 74.763672] event-sample-fn/1084 is trying to acquire lock: [ 74.764152] ffffffff86c9d6b0 (direct_mutex){+.+.}-{3:3}, at: \ re... • https://git.kernel.org/stable/c/53cd885bc5c3ea283cc9c00ca6446c778f00bfba •
CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0CVE-2022-50647 – RISC-V: Make port I/O string accessors actually work
https://notcve.org/view.php?id=CVE-2022-50647
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: RISC-V: Make port I/O string accessors actually work Fix port I/O string accessors such as `insb', `outsb', etc. which use the physical PCI port I/O address rather than the corresponding memory mapping to get at the requested location, which in turn breaks at least accesses made by our parport driver to a PCIe parallel port such as: PCI parallel port detected: 1415:c118, I/O at 0x1000(0x1008), IRQ 20 parport0: PC-style at 0x1000 (0x1008), i... • https://git.kernel.org/stable/c/fab957c11efe2f405e08b9f0d080524bc2631428 •
CVSS: 7.1EPSS: 0%CPEs: 8EXPL: 0CVE-2022-50646 – scsi: hpsa: Fix possible memory leak in hpsa_init_one()
https://notcve.org/view.php?id=CVE-2022-50646
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: scsi: hpsa: Fix possible memory leak in hpsa_init_one() The hpda_alloc_ctlr_info() allocates h and its field reply_map. However, in hpsa_init_one(), if alloc_percpu() failed, the hpsa_init_one() jumps to clean1 directly, which frees h and leaks the h->reply_map. Fix by calling hpda_free_ctlr_info() to release h->replay_map and h instead free h directly. In the Linux kernel, the following vulnerability has been resolved: scsi: hpsa: Fix poss... • https://git.kernel.org/stable/c/8b834bff1b73dce46f4e9f5e84af6f73fed8b0ef •
CVSS: 7.1EPSS: 0%CPEs: 6EXPL: 0CVE-2022-50645 – EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper()
https://notcve.org/view.php?id=CVE-2022-50645
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper() As the comment of pci_get_domain_bus_and_slot() says, it returns a PCI device with refcount incremented, so it doesn't need to call an extra pci_dev_get() in pci_get_dev_wrapper(), and the PCI device needs to be put in the error path. In the Linux kernel, the following vulnerability has been resolved: EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper() As the comment of pci_get_domai... • https://git.kernel.org/stable/c/d4dc89d069aab9074e2493a4c2f3969a0a0b91c1 •
CVSS: 7.1EPSS: 0%CPEs: 9EXPL: 0CVE-2022-50644 – clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe
https://notcve.org/view.php?id=CVE-2022-50644
09 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe pm_runtime_get_sync() will increment pm usage counter. Forgetting to putting operation will result in reference leak. Add missing pm_runtime_put_sync in some error paths. In the Linux kernel, the following vulnerability has been resolved: clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe pm_runtime_get_sync() will increment pm usage counter. Forgetting to putting op... • https://git.kernel.org/stable/c/9ac33b0ce81fa48dd39e7ddfc1bf4519052181dd •
