CVSS: -EPSS: 0%CPEs: 9EXPL: 0CVE-2022-50850 – scsi: ipr: Fix WARNING in ipr_init()
https://notcve.org/view.php?id=CVE-2022-50850
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: scsi: ipr: Fix WARNING in ipr_init() ipr_init() will not call unregister_reboot_notifier() when pci_register_driver() fails, which causes a WARNING. Call unregister_reboot_notifier() when pci_register_driver() fails. notifier callback ipr_halt [ipr] already registered WARNING: CPU: 3 PID: 299 at kernel/notifier.c:29 notifier_chain_register+0x16d/0x230 Modules linked in: ipr(+) xhci_pci_renesas xhci_hcd ehci_hcd usbcore led_class gpu_sched d... • https://git.kernel.org/stable/c/f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa •
CVSS: -EPSS: 0%CPEs: 9EXPL: 0CVE-2022-50849 – pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP
https://notcve.org/view.php?id=CVE-2022-50849
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP An oops can be induced by running 'cat /proc/kcore > /dev/null' on devices using pstore with the ram backend because kmap_atomic() assumes lowmem pages are accessible with __va(). Unable to handle kernel paging request at virtual address ffffff807ff2b000 Mem abort info: ESR = 0x96000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 tran... • https://git.kernel.org/stable/c/404a6043385de17273624b076599669db5ad891f •
CVSS: -EPSS: 0%CPEs: 9EXPL: 0CVE-2022-50848 – drivers: dio: fix possible memory leak in dio_init()
https://notcve.org/view.php?id=CVE-2022-50848
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: drivers: dio: fix possible memory leak in dio_init() If device_register() returns error, the 'dev' and name needs be freed. Add a release function, and then call put_device() in the error path, so the name is freed in kobject_cleanup() and to the 'dev' is freed in release function. • https://git.kernel.org/stable/c/2e4c77bea3d8b17d94f8ee382411f359b708560f •
CVSS: -EPSS: 0%CPEs: 10EXPL: 0CVE-2023-54243 – netfilter: ebtables: fix table blob use-after-free
https://notcve.org/view.php?id=CVE-2023-54243
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: netfilter: ebtables: fix table blob use-after-free We are not allowed to return an error at this point. Looking at the code it looks like ret is always 0 at this point, but its not. t = find_table_lock(net, repl->name, &ret, &ebt_mutex); ... this can return a valid table, with ret != 0. This bug causes update of table->private with the new blob, but then frees the blob right away in the caller. Syzbot report: BUG: KASAN: vmalloc-out-of-boun... • https://git.kernel.org/stable/c/c58dd2dd443c26d856a168db108a0cd11c285bf3 •
CVSS: -EPSS: 0%CPEs: 3EXPL: 0CVE-2023-54242 – block, bfq: Fix division by zero error on zero wsum
https://notcve.org/view.php?id=CVE-2023-54242
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: block, bfq: Fix division by zero error on zero wsum When the weighted sum is zero the calculation of limit causes a division by zero error. Fix this by continuing to the next level. This was discovered by running as root: stress-ng --ioprio 0 Fixes divison by error oops: [ 521.450556] divide error: 0000 [#1] SMP NOPTI [ 521.450766] CPU: 2 PID: 2684464 Comm: stress-ng-iopri Not tainted 6.2.1-1280.native #1 [ 521.451117] Hardware name: QEMU S... • https://git.kernel.org/stable/c/1655cfc85250a224b0d9486c8136baeea33b9b5c •
CVSS: -EPSS: 0%CPEs: 2EXPL: 0CVE-2023-54233 – ASoC: SOF: avoid a NULL dereference with unsupported widgets
https://notcve.org/view.php?id=CVE-2023-54233
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: avoid a NULL dereference with unsupported widgets If an IPC4 topology contains an unsupported widget, its .module_info field won't be set, then sof_ipc4_route_setup() will cause a kernel Oops trying to dereference it. Add a check for such cases. • https://git.kernel.org/stable/c/170818974e9732506195c6302743856cc8bdfd6f •
CVSS: -EPSS: 0%CPEs: 8EXPL: 0CVE-2023-54232 – m68k: Only force 030 bus error if PC not in exception table
https://notcve.org/view.php?id=CVE-2023-54232
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: m68k: Only force 030 bus error if PC not in exception table __get_kernel_nofault() does copy data in supervisor mode when forcing a task backtrace log through /proc/sysrq_trigger. This is expected cause a bus error exception on e.g. NULL pointer dereferencing when logging a kernel task has no workqueue associated. This bus error ought to be ignored. Our 030 bus error handler is ill equipped to deal with this: Whenever ssw indicates a kernel... • https://git.kernel.org/stable/c/1a6059f5ed57f48edfe7159404ff7d538d9d405b •
CVSS: -EPSS: 0%CPEs: 9EXPL: 0CVE-2023-54230 – amba: bus: fix refcount leak
https://notcve.org/view.php?id=CVE-2023-54230
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: amba: bus: fix refcount leak commit 5de1540b7bc4 ("drivers/amba: create devices from device tree") increases the refcount of of_node, but not releases it in amba_device_release, so there is refcount leak. By using of_node_put to avoid refcount leak. • https://git.kernel.org/stable/c/5de1540b7bc4c23470f86add1e517be41e7fefe2 •
CVSS: -EPSS: 0%CPEs: 5EXPL: 0CVE-2023-54229 – wifi: ath11k: fix registration of 6Ghz-only phy without the full channel range
https://notcve.org/view.php?id=CVE-2023-54229
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix registration of 6Ghz-only phy without the full channel range Because of what seems to be a typo, a 6Ghz-only phy for which the BDF does not allow the 7115Mhz channel will fail to register: WARNING: CPU: 2 PID: 106 at net/wireless/core.c:907 wiphy_register+0x914/0x954 Modules linked in: ath11k_pci sbsa_gwdt CPU: 2 PID: 106 Comm: kworker/u8:5 Not tainted 6.3.0-rc7-next-20230418-00549-g1e096a17625a-dirty #9 Hardware name: Fre... • https://git.kernel.org/stable/c/532f8bac60419eb28158770470b9bb655de207c8 •
CVSS: -EPSS: 0%CPEs: 2EXPL: 0CVE-2023-54227 – blk-mq: fix tags leak when shrink nr_hw_queues
https://notcve.org/view.php?id=CVE-2023-54227
30 Dec 2025 — In the Linux kernel, the following vulnerability has been resolved: blk-mq: fix tags leak when shrink nr_hw_queues Although we don't need to realloc set->tags[] when shrink nr_hw_queues, we need to free them. Or these tags will be leaked. How to reproduce: 1. mount -t configfs configfs /mnt 2. modprobe null_blk nr_devices=0 submit_queues=8 3. mkdir /mnt/nullb/nullb0 4. echo 1 > /mnt/nullb/nullb0/power 5. echo 4 > /mnt/nullb/nullb0/submit_queues 6. rmdir /mnt/nullb/nullb0 In step 4, will alloc 9 tags (8 subm... • https://git.kernel.org/stable/c/c0ef7493e68b8896806a2f598fcffbaa97333405 •
