CVSS: -EPSS: 0%CPEs: 9EXPL: 0CVE-2023-54244 – ACPI: EC: Fix oops when removing custom query handlers
https://notcve.org/view.php?id=CVE-2023-54244
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: ACPI: EC: Fix oops when removing custom query handlers When removing custom query handlers, the handler might still be used inside the EC query workqueue, causing a kernel oops if the module holding the callback function was already unloaded. Fix this by flushing the EC query workqueue when removing custom query handlers. Tested on a Acer Travelmate 4002WLMi The SUSE Linux Enterprise 15 SP5 RT kernel was updated to fix various security issu... • https://git.kernel.org/stable/c/a62e8f1978f49e52f87a711ff6711b323d4b12ff •
CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2022-50872 – ARM: OMAP2+: Fix memory leak in realtime_counter_init()
https://notcve.org/view.php?id=CVE-2022-50872
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: ARM: OMAP2+: Fix memory leak in realtime_counter_init() The "sys_clk" resource is malloced by clk_get(), it is not released when the function return. The SUSE Linux Enterprise 15 SP5 RT kernel was updated to fix various security issues. • https://git.kernel.org/stable/c/fa6d79d27614223d82418023b7f5300f1a1530d3 •
CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2022-50870 – powerpc/rtas: avoid device tree lookups in rtas_os_term()
https://notcve.org/view.php?id=CVE-2022-50870
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas: avoid device tree lookups in rtas_os_term() rtas_os_term() is called during panic. Its behavior depends on a couple of conditions in the /rtas node of the device tree, the traversal of which entails locking and local IRQ state changes. If the kernel panics while devtree_lock is held, rtas_os_term() as currently written could hang. Instead of discovering the relevant characteristics at panic time, cache them in file-static vari... • https://git.kernel.org/stable/c/088186ded490ced80758200cf8f906ed741df306 •
CVSS: -EPSS: 0%CPEs: 9EXPL: 0CVE-2022-50868 – hwrng: amd - Fix PCI device refcount leak
https://notcve.org/view.php?id=CVE-2022-50868
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: hwrng: amd - Fix PCI device refcount leak for_each_pci_dev() is implemented by pci_get_device(). The comment of pci_get_device() says that it will increase the reference count for the returned pci_dev and also decrease the reference count for the input pci_dev @from if it is not NULL. If we break for_each_pci_dev() loop with pdev not NULL, we need to call pci_dev_put() to decrease the reference count. Add the missing pci_dev_put() for the n... • https://git.kernel.org/stable/c/96d63c0297ccfd6d9059c614b3f5555d9441a2b3 •
CVSS: -EPSS: 0%CPEs: 9EXPL: 0CVE-2022-50866 – ASoC: pxa: fix null-pointer dereference in filter()
https://notcve.org/view.php?id=CVE-2022-50866
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: ASoC: pxa: fix null-pointer dereference in filter() kasprintf() would return NULL pointer when kmalloc() fail to allocate. Need to check the return pointer before calling strcmp(). The SUSE Linux Enterprise 15 SP5 RT kernel was updated to fix various security issues. • https://git.kernel.org/stable/c/7a824e214e25a49442fe868dac0af8a904b24f58 •
CVSS: -EPSS: 0%CPEs: 5EXPL: 0CVE-2022-50865 – tcp: fix a signed-integer-overflow bug in tcp_add_backlog()
https://notcve.org/view.php?id=CVE-2022-50865
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and in tcp_add_backlog(), the variable limit is caculated by adding sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value of int and overflow. This patch reduces the limit budget by halving the sndbuf to solve this issue since ACK packets are much smaller than the payload. An update for kernel-rt is now available ... • https://git.kernel.org/stable/c/c9c3321257e1b95be9b375f811fb250162af8d39 •
CVSS: -EPSS: 0%CPEs: 5EXPL: 0CVE-2022-50864 – nilfs2: fix shift-out-of-bounds due to too large exponent of block size
https://notcve.org/view.php?id=CVE-2022-50864
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix shift-out-of-bounds due to too large exponent of block size If field s_log_block_size of superblock data is corrupted and too large, init_nilfs() and load_nilfs() still can trigger a shift-out-of-bounds warning followed by a kernel panic (if panic_on_warn is set): shift exponent 38973 is too large for 32-bit type 'int' Call Trace:
CVSS: -EPSS: 0%CPEs: 9EXPL: 0CVE-2022-50857 – rapidio: rio: fix possible name leak in rio_register_mport()
https://notcve.org/view.php?id=CVE-2022-50857
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: rapidio: rio: fix possible name leak in rio_register_mport() If device_register() returns error, the name allocated by dev_set_name() need be freed. It should use put_device() to give up the reference in the error path, so that the name can be freed in kobject_cleanup(), and list_del() is called to delete the port from rio_mports. • https://git.kernel.org/stable/c/2aaf308b95b24649a6dcfed89cd956e972089b2a •
CVSS: -EPSS: 0%CPEs: 9EXPL: 0CVE-2022-50850 – scsi: ipr: Fix WARNING in ipr_init()
https://notcve.org/view.php?id=CVE-2022-50850
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: scsi: ipr: Fix WARNING in ipr_init() ipr_init() will not call unregister_reboot_notifier() when pci_register_driver() fails, which causes a WARNING. Call unregister_reboot_notifier() when pci_register_driver() fails. notifier callback ipr_halt [ipr] already registered WARNING: CPU: 3 PID: 299 at kernel/notifier.c:29 notifier_chain_register+0x16d/0x230 Modules linked in: ipr(+) xhci_pci_renesas xhci_hcd ehci_hcd usbcore led_class gpu_sched d... • https://git.kernel.org/stable/c/f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa •
CVSS: -EPSS: 0%CPEs: 9EXPL: 0CVE-2022-50849 – pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP
https://notcve.org/view.php?id=CVE-2022-50849
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP An oops can be induced by running 'cat /proc/kcore > /dev/null' on devices using pstore with the ram backend because kmap_atomic() assumes lowmem pages are accessible with __va(). Unable to handle kernel paging request at virtual address ffffff807ff2b000 Mem abort info: ESR = 0x96000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 tran... • https://git.kernel.org/stable/c/404a6043385de17273624b076599669db5ad891f •
