
CVE-2022-50041 – ice: Fix call trace with null VSI during VF reset
https://notcve.org/view.php?id=CVE-2022-50041
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: ice: Fix call trace with null VSI during VF reset During stress test with attaching and detaching VF from KVM and simultaneously changing VFs spoofcheck and trust there was a call trace in ice_reset_vf that VF's VSI is null. [145237.352797] WARNING: CPU: 46 PID: 840629 at drivers/net/ethernet/intel/ice/ice_vf_lib.c:508 ice_reset_vf+0x3d6/0x410 [ice] [145237.352851] Modules linked in: ice(E) vfio_pci vfio_pci_core vfio_virqfd vfio_iommu_type... • https://git.kernel.org/stable/c/efe41860008e57fb6b69855b4b93fdf34bc42798 •

CVE-2022-50040 – net: dsa: sja1105: fix buffer overflow in sja1105_setup_devlink_regions()
https://notcve.org/view.php?id=CVE-2022-50040
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: net: dsa: sja1105: fix buffer overflow in sja1105_setup_devlink_regions() If an error occurs in dsa_devlink_region_create(), then 'priv->regions' array will be accessed by negative index '-1'. Found by Linux Verification Center (linuxtesting.org) with SVACE. In the Linux kernel, the following vulnerability has been resolved: net: dsa: sja1105: fix buffer overflow in sja1105_setup_devlink_regions() If an error occurs in dsa_devlink_region_cr... • https://git.kernel.org/stable/c/bf425b82059e0b0752c0026353c1902112200837 •

CVE-2022-50039 – stmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove()
https://notcve.org/view.php?id=CVE-2022-50039
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: stmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove() Commit 09f012e64e4b ("stmmac: intel: Fix clock handling on error and remove paths") removed this clk_disable_unprepare() This was partly revert by commit ac322f86b56c ("net: stmmac: Fix clock handling on remove path") which removed this clk_disable_unprepare() because: " While unloading the dwmac-intel driver, clk_disable_unprepare() is being called twice in... • https://git.kernel.org/stable/c/3afe11be6435e126f1507ddf1a9d0e5a0d90b336 •

CVE-2022-50038 – drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors()
https://notcve.org/view.php?id=CVE-2022-50038
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() In this function, there are two refcount leak bugs: (1) when breaking out of for_each_endpoint_of_node(), we need call the of_node_put() for the 'ep'; (2) we should call of_node_put() for the reference returned by of_graph_get_remote_port() when it is not used anymore. In the Linux kernel, the following vulnerability has been resolved: drm/meson: Fix refcount bugs in meson... • https://git.kernel.org/stable/c/bbbe775ec5b5dace43a35886da9924837da09ddd •

CVE-2022-50037 – drm/i915/ttm: don't leak the ccs state
https://notcve.org/view.php?id=CVE-2022-50037
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: drm/i915/ttm: don't leak the ccs state The kernel only manages the ccs state with lmem-only objects, however the kernel should still take care not to leak the CCS state from the previous user. (cherry picked from commit 353819d85f87be46aeb9c1dd929d445a006fc6ec) In the Linux kernel, the following vulnerability has been resolved: drm/i915/ttm: don't leak the ccs state The kernel only manages the ccs state with lmem-only objects, however the k... • https://git.kernel.org/stable/c/48760ffe923aeb2cc73865ea36b3509718d102e3 •

CVE-2022-50036 – drm/sun4i: dsi: Prevent underflow when computing packet sizes
https://notcve.org/view.php?id=CVE-2022-50036
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: drm/sun4i: dsi: Prevent underflow when computing packet sizes Currently, the packet overhead is subtracted using unsigned arithmetic. With a short sync pulse, this could underflow and wrap around to near the maximal u16 value. Fix this by using signed subtraction. The call to max() will correctly handle any negative numbers that are produced. Apply the same fix to the other timings, even though those subtractions are less likely to underflo... • https://git.kernel.org/stable/c/133add5b5ad42b7bb5fcd59d681aef6475d08600 •

CVE-2022-50035 – drm/amdgpu: Fix use-after-free on amdgpu_bo_list mutex
https://notcve.org/view.php?id=CVE-2022-50035
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix use-after-free on amdgpu_bo_list mutex If amdgpu_cs_vm_handling returns r != 0, then it will unlock the bo_list_mutex inside the function amdgpu_cs_vm_handling and again on amdgpu_cs_parser_fini. This problem results in the following use-after-free problem: [ 220.280990] ------------[ cut here ]------------ [ 220.281000] refcount_t: underflow; use-after-free. [ 220.281019] WARNING: CPU: 1 PID: 3746 at lib/refcount.c:28 refco... • https://git.kernel.org/stable/c/90af0ca047f3049c4b46e902f432ad6ef1e2ded6 •

CVE-2022-50034 – usb: cdns3 fix use-after-free at workaround 2
https://notcve.org/view.php?id=CVE-2022-50034
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: usb: cdns3 fix use-after-free at workaround 2 BUG: KFENCE: use-after-free read in __list_del_entry_valid+0x10/0xac cdns3_wa2_remove_old_request() { ... kfree(priv_req->request.buf); cdns3_gadget_ep_free_request(&priv_ep->endpoint, &priv_req->request); list_del_init(&priv_req->list); ^^^ use after free ... } cdns3_gadget_ep_free_request() free the space pointed by priv_req, but priv_req is used in the following list_del_init(). This patch mo... • https://git.kernel.org/stable/c/8bc1901ca7b07d864fca11461b3875b31f949765 •

CVE-2022-50033 – usb: host: ohci-ppc-of: Fix refcount leak bug
https://notcve.org/view.php?id=CVE-2022-50033
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: usb: host: ohci-ppc-of: Fix refcount leak bug In ohci_hcd_ppc_of_probe(), of_find_compatible_node() will return a node pointer with refcount incremented. We should use of_node_put() when it is not used anymore. In the Linux kernel, the following vulnerability has been resolved: usb: host: ohci-ppc-of: Fix refcount leak bug In ohci_hcd_ppc_of_probe(), of_find_compatible_node() will return a node pointer with refcount incremented. We should u... • https://git.kernel.org/stable/c/fe6fe64403710287f0ae61a516954d8a4f7c9e3f •

CVE-2022-50032 – usb: renesas: Fix refcount leak bug
https://notcve.org/view.php?id=CVE-2022-50032
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: usb: renesas: Fix refcount leak bug In usbhs_rza1_hardware_init(), of_find_node_by_name() will return a node pointer with refcount incremented. We should use of_node_put() when it is not used anymore. In the Linux kernel, the following vulnerability has been resolved: usb: renesas: Fix refcount leak bug In usbhs_rza1_hardware_init(), of_find_node_by_name() will return a node pointer with refcount incremented. We should use of_node_put() whe... • https://git.kernel.org/stable/c/36b18b777dece704b7c2e9e7947ca41a9b0fb009 •