
CVE-2022-49120 – scsi: pm8001: Fix task leak in pm8001_send_abort_all()
https://notcve.org/view.php?id=CVE-2022-49120
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix task leak in pm8001_send_abort_all() In pm8001_send_abort_all(), make sure to free the allocated sas task if pm8001_tag_alloc() or pm8001_mpi_build_cmd() fail. • https://git.kernel.org/stable/c/2051044d7901f1a9d7be95d0d32e53b88e9548f7 •

CVE-2022-49119 – scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req()
https://notcve.org/view.php?id=CVE-2022-49119
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req() In pm8001_chip_fw_flash_update_build(), if pm8001_chip_fw_flash_update_build() fails, the struct fw_control_ex allocated must be freed. • https://git.kernel.org/stable/c/d83574666bac4b1462e90df393fbed6c5f57d1a3 •

CVE-2022-49118 – scsi: hisi_sas: Free irq vectors in order for v3 HW
https://notcve.org/view.php?id=CVE-2022-49118
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: scsi: hisi_sas: Free irq vectors in order for v3 HW If the driver probe fails to request the channel IRQ or fatal IRQ, the driver will free the IRQ vectors before freeing the IRQs in free_irq(), and this will cause a kernel BUG like this: ------------[ cut here ]------------ kernel BUG at drivers/pci/msi.c:369! Internal error: Oops - BUG: 0 [#1] PREEMPT SMP Call trace: free_msi_irqs+0x118/0x13c pci_disable_msi+0xfc/0x120 pci_free_irq_vector... • https://git.kernel.org/stable/c/224903cc60d045576393c3b16907742f23e6c740 •

CVE-2022-49117 – mips: ralink: fix a refcount leak in ill_acc_of_setup()
https://notcve.org/view.php?id=CVE-2022-49117
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: mips: ralink: fix a refcount leak in ill_acc_of_setup() of_node_put(np) needs to be called when pdev == NULL. • https://git.kernel.org/stable/c/060a485df4ec1183d543317511cb4caa43468b5d •

CVE-2022-49116 – Bluetooth: use memset avoid memory leaks
https://notcve.org/view.php?id=CVE-2022-49116
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: Bluetooth: use memset avoid memory leaks Use memset to initialize structs to prevent memory leaks in l2cap_ecred_connect • https://git.kernel.org/stable/c/9567d54e70ff58c2695c2cc2e53c86c67551d3e6 •

CVE-2022-49115 – PCI: endpoint: Fix misused goto label
https://notcve.org/view.php?id=CVE-2022-49115
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: Fix misused goto label Fix a misused goto label jump since that can result in a memory leak. • https://git.kernel.org/stable/c/5ebf3fc59bd20d17df3ba26159787d13cf20d362 •

CVE-2022-49114 – scsi: libfc: Fix use after free in fc_exch_abts_resp()
https://notcve.org/view.php?id=CVE-2022-49114
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: scsi: libfc: Fix use after free in fc_exch_abts_resp() fc_exch_release(ep) will decrease the ep's reference count. When the reference count reaches zero, it is freed. But ep is still used in the following code, which will lead to a use after free. Return after the fc_exch_release() call to avoid use after free. • https://git.kernel.org/stable/c/4a131d4ea8b581ac9b01d3a72754db4848be3232 •

CVE-2022-49113 – powerpc/secvar: fix refcount leak in format_show()
https://notcve.org/view.php?id=CVE-2022-49113
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: powerpc/secvar: fix refcount leak in format_show() Refcount leak will happen when format_show returns failure in multiple cases. Unified management of of_node_put can fix this problem. • https://git.kernel.org/stable/c/02222bf4f0a27f6eba66d1f597cdb5daadd51829 •

CVE-2022-49112 – mt76: fix monitor mode crash with sdio driver
https://notcve.org/view.php?id=CVE-2022-49112
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: mt76: fix monitor mode crash with sdio driver mt7921s driver may receive frames with fragment buffers. If there is a CTS packet received in monitor mode, the payload is 10 bytes only and need 6 bytes header padding after RXD buffer. However, only RXD in the first linear buffer, if we pull buffer size RXD-size+6 bytes with skb_pull(), that would trigger "BUG_ON(skb->len < skb->data_len)" in __skb_pull(). To avoid the nonlinear buffer issue, ... • https://git.kernel.org/stable/c/7bc04215a66b60e198aecaee8418f6d79fa19faa •

CVE-2022-49111 – Bluetooth: Fix use after free in hci_send_acl
https://notcve.org/view.php?id=CVE-2022-49111
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix use after free in hci_send_acl This fixes the following trace caused by receiving HCI_EV_DISCONN_PHY_LINK_COMPLETE which does call hci_conn_del without first checking if conn->type is in fact AMP_LINK and in case it is do properly cleanup upper layers with hci_disconn_cfm: ================================================================== BUG: KASAN: use-after-free in hci_send_acl+0xaba/0xc50 Read of size 8 at addr ffff88800e... • https://git.kernel.org/stable/c/c41de54b0a963e59e4dd04c029a4a6d73f45ef9c •