
CVE-2022-50025 – cxl: Fix a memory leak in an error handling path
https://notcve.org/view.php?id=CVE-2022-50025
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: cxl: Fix a memory leak in an error handling path A bitmap_zalloc() must be balanced by a corresponding bitmap_free() in the error handling path of afu_allocate_irqs(). In the Linux kernel, the following vulnerability has been resolved: cxl: Fix a memory leak in an error handling path A bitmap_zalloc() must be balanced by a corresponding bitmap_free() in the error handling path of afu_allocate_irqs(). • https://git.kernel.org/stable/c/c2c7a29f99788e9e5dfe41d16868ea33da7cc235 •

CVE-2022-50024 – dmaengine: dw-axi-dmac: do not print NULL LLI during error
https://notcve.org/view.php?id=CVE-2022-50024
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw-axi-dmac: do not print NULL LLI during error During debugging we have seen an issue where axi_chan_dump_lli() is passed a NULL LLI pointer which ends up causing an OOPS due to trying to get fields from it. In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw-axi-dmac: do not print NULL LLI during error During debugging we have seen an issue where axi_chan_dump_lli() is passed a NULL L... • https://git.kernel.org/stable/c/af76e6fdcf92f1a742b788d0dba5edd194267bf9 •

CVE-2022-50023 – dmaengine: dw-axi-dmac: ignore interrupt if no descriptor
https://notcve.org/view.php?id=CVE-2022-50023
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw-axi-dmac: ignore interrupt if no descriptor If the channel has no descriptor and the interrupt is raised then the kernel will OOPS. ... In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw-axi-dmac: ignore interrupt if no descriptor If the channel has no descriptor and the interrupt is raised then the kernel will OOPS. • https://git.kernel.org/stable/c/54aa6c49361b79f7f6b15fc63dfe9ea52c70bb03 •

CVE-2022-50022 – drivers:md:fix a potential use-after-free bug
https://notcve.org/view.php?id=CVE-2022-50022
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: drivers:md:fix a potential use-after-free bug In line 2884, "raid5_release_stripe(sh);" drops the reference to sh and may cause sh to be released. ... In the Linux kernel, the following vulnerability has been resolved: drivers:md:fix a potential use-after-free bug In line 2884, "raid5_release_stripe(sh);" drops the reference to sh and may cause sh to be released. • https://git.kernel.org/stable/c/59fc630b8b5f9f21c8ce3ba153341c107dce1b0c • CWE-416: Use After Free •

CVE-2022-50021 – ext4: block range must be validated before use in ext4_mb_clear_bb()
https://notcve.org/view.php?id=CVE-2022-50021
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: ext4: block range must be validated before use in ext4_mb_clear_bb() Block range to free is validated in ext4_free_blocks() using ext4_inode_block_valid() and then it's passed to ext4_mb_clear_bb(). In the Linux kernel, the following vulnerability has been resolved: ext4: block range must be validated before use in ext4_mb_clear_bb() Block range to free is validated in ext4_free_blocks() using ext4_inode_block_valid() and then... • https://git.kernel.org/stable/c/7550aade978371ac582f6d43b14c4cb89ca54463 •

CVE-2022-50020 – ext4: avoid resizing to a partial cluster size
https://notcve.org/view.php?id=CVE-2022-50020
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: ext4: avoid resizing to a partial cluster size This patch avoids an attempt to resize the filesystem to an unaligned cluster boundary. ... In the Linux kernel, the following vulnerability has been resolved: ext4: avoid resizing to a partial cluster size This patch avoids an attempt to resize the filesystem to an unaligned cluster boundary. • https://git.kernel.org/stable/c/53f62a4201be1cfc1e3c971e566888b182c3ffb0 • CWE-1284: Improper Validation of Specified Quantity in Input •

CVE-2022-50019 – tty: serial: Fix refcount leak bug in ucc_uart.c
https://notcve.org/view.php?id=CVE-2022-50019
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: tty: serial: Fix refcount leak bug in ucc_uart.c In soc_info(), of_find_node_by_type() will return a node pointer with refcount incremented. ... In the Linux kernel, the following vulnerability has been resolved: tty: serial: Fix refcount leak bug in ucc_uart.c In soc_info(), of_find_node_by_type() will return a node pointer with refcount incremented. • https://git.kernel.org/stable/c/8245e7d1d7f75a9255ad1e8146752e5051d528b8 •

CVE-2022-50017 – mips: cavium-octeon: Fix missing of_node_put() in octeon2_usb_clocks_start
https://notcve.org/view.php?id=CVE-2022-50017
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: mips: cavium-octeon: Fix missing of_node_put() in octeon2_usb_clocks_start We should call of_node_put() for the reference 'uctl_node' returned by of_get_parent() which will increase the refcount. In the Linux kernel, the following vulnerability has been resolved: mips: cavium-octeon: Fix missing of_node_put() in octeon2_usb_clocks_start We should call of_node_put() for the reference 'uctl_node' returned by of_get_parent() whic... • https://git.kernel.org/stable/c/9d1afa0169a84dcd5b79901d792edeb8403684ab •

CVE-2022-50016 – ASoC: SOF: Intel: cnl: Do not process IPC reply before firmware boot
https://notcve.org/view.php?id=CVE-2022-50016
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: cnl: Do not process IPC reply before firmware boot It is not yet clear, but it is possible to create a firmware so broken that it will send a reply message before a FW_READY message (it is not yet clear if FW_READY will arrive later). In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: cnl: Do not process IPC reply before firmware boot It is not yet clear, but it is possible ... • https://git.kernel.org/stable/c/273020522ef62361c5d86eebe45a72418ed8dea4 •

CVE-2022-50015 – ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot
https://notcve.org/view.php?id=CVE-2022-50015
18 Jun 2025 — In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot It is not yet clear, but it is possible to create a firmware so broken that it will send a reply message before a FW_READY message (it is not yet clear if FW_READY will arrive later). In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot It is not yet clear, but it is p... • https://git.kernel.org/stable/c/6e9cde974863dc9d9c6cdb178f625e410c5be3d0 •