
CVE-2022-50051 – ASoC: SOF: debug: Fix potential buffer overflow by snprintf()
https://notcve.org/view.php?id=CVE-2022-50051
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: debug: Fix potential buffer overflow by snprintf() snprintf() returns the would-be-filled size when the string overflows the given buffer size, hence using this value may result in the buffer overflow (although it's unrealistic). This patch replaces with a safer version, scnprintf() for papering over such a potential issue. In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: debug: Fix potential buffer ... • https://git.kernel.org/stable/c/5b10b62989219aa527ee4fa555d1995a3b70981b •

CVE-2022-50050 – ASoC: SOF: Intel: hda: Fix potential buffer overflow by snprintf()
https://notcve.org/view.php?id=CVE-2022-50050
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda: Fix potential buffer overflow by snprintf() snprintf() returns the would-be-filled size when the string overflows the given buffer size, hence using this value may result in the buffer overflow (although it's unrealistic). This patch replaces with a safer version, scnprintf() for papering over such a potential issue. In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda: Fix potenti... • https://git.kernel.org/stable/c/29c8e4398f02adacd429c7847dacc8aea5a0c2f1 •

CVE-2022-50049 – ASoC: DPCM: Don't pick up BE without substream
https://notcve.org/view.php?id=CVE-2022-50049
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: ASoC: DPCM: Don't pick up BE without substream When DPCM tries to add valid BE connections at dpcm_add_paths(), it doesn't check whether the picked BE actually supports for the given stream direction. Due to that, when an asymmetric BE stream is present, it picks up wrongly and this may result in a NULL dereference at a later point where the code assumes the existence of a corresponding BE substream. This patch adds the check for the presen... • https://git.kernel.org/stable/c/bbf7d3b1c4f40eb02dd1dffb500ba00b0bff0303 •

CVE-2022-50048 – netfilter: nf_tables: possible module reference underflow in error path
https://notcve.org/view.php?id=CVE-2022-50048
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: possible module reference underflow in error path dst->ops is set on when nft_expr_clone() fails, but module refcount has not been bumped yet, therefore nft_expr_destroy() leads to module reference underflow. In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: possible module reference underflow in error path dst->ops is set on when nft_expr_clone() fails, but module refcount has n... • https://git.kernel.org/stable/c/8cfd9b0f8515e7c361bba27e2a2684cbd427fe01 •

CVE-2022-50047 – net: dsa: mv88e6060: prevent crash on an unused port
https://notcve.org/view.php?id=CVE-2022-50047
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6060: prevent crash on an unused port If the port isn't a CPU port nor a user port, 'cpu_dp' is a null pointer and a crash happened on dereferencing it in mv88e6060_setup_port(): [ 9.575872] Unable to handle kernel NULL pointer dereference at virtual address 00000014 ... [ 9.942216] mv88e6060_setup from dsa_register_switch+0x814/0xe84 [ 9.948616] dsa_register_switch from mdio_probe+0x2c/0x54 [ 9.954433] mdio_probe from really... • https://git.kernel.org/stable/c/0abfd494deefdbab66ac03c1181a614285e7d90c •

CVE-2022-50046 – net/sunrpc: fix potential memory leaks in rpc_sysfs_xprt_state_change()
https://notcve.org/view.php?id=CVE-2022-50046
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: net/sunrpc: fix potential memory leaks in rpc_sysfs_xprt_state_change() The issue happens on some error handling paths. When the function fails to grab the object `xprt`, it simply returns 0, forgetting to decrease the reference count of another object `xps`, which is increased by rpc_sysfs_xprt_kobj_get_xprt_switch(), causing refcount leaks. Also, the function forgets to check whether `xps` is valid before using it, which may result in NUL... • https://git.kernel.org/stable/c/5b7eb78486cd9ac58bfbd6d84ea0fe2d9fead03b •

CVE-2022-50045 – powerpc/pci: Fix get_phb_number() locking
https://notcve.org/view.php?id=CVE-2022-50045
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: powerpc/pci: Fix get_phb_number() locking The recent change to get_phb_number() causes a DEBUG_ATOMIC_SLEEP warning on some systems: BUG: sleeping function called from invalid context at kernel/locking/mutex.c:580 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 1 lock held by swapper/1: #0: c157efb0 (hose_spinlock){+.+.}-{2:2}, at: pcibios_alloc_controller+... • https://git.kernel.org/stable/c/47a8fe1b154aa6d836582365b1c70684af8597e4 •

CVE-2022-50044 – net: qrtr: start MHI channel after endpoit creation
https://notcve.org/view.php?id=CVE-2022-50044
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: net: qrtr: start MHI channel after endpoit creation MHI channel may generates event/interrupt right after enabling. It may leads to 2 race conditions issues. 1) Such event may be dropped by qcom_mhi_qrtr_dl_callback() at check: if (!qdev || mhi_res->transaction_status) return; Because dev_set_drvdata(&mhi_dev->dev, qdev) may be not performed at this moment. In this situation qrtr-ns will be unable to enumerate services in device. ----------... • https://git.kernel.org/stable/c/a2e2cc0dbb1121dfa875da1c04f3dff966fec162 •

CVE-2022-50043 – net: fix potential refcount leak in ndisc_router_discovery()
https://notcve.org/view.php?id=CVE-2022-50043
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: net: fix potential refcount leak in ndisc_router_discovery() The issue happens on specific paths in the function. After both the object `rt` and `neigh` are grabbed successfully, when `lifetime` is nonzero but the metric needs change, the function just deletes the route and set `rt` to NULL. Then, it may try grabbing `rt` and `neigh` again if above conditions hold. The function simply overwrite `neigh` if succeeds or returns if fails, witho... • https://git.kernel.org/stable/c/6b2e04bc240fe9be9e690059f710e9f95346d34d •

CVE-2022-50042 – net: genl: fix error path memory leak in policy dumping
https://notcve.org/view.php?id=CVE-2022-50042
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: net: genl: fix error path memory leak in policy dumping If construction of the array of policies fails when recording non-first policy we need to unwind. netlink_policy_dump_add_policy() itself also needs fixing as it currently gives up on error without recording the allocated pointer in the pstate pointer. In the Linux kernel, the following vulnerability has been resolved: net: genl: fix error path memory leak in policy dumping If construc... • https://git.kernel.org/stable/c/50a896cf2d6f34e884a00139d6e6012c9833ace3 •