-
CVE-2022-50850
- EPSS 0.05%
- Veröffentlicht 30.12.2025 12:15:27
- Zuletzt bearbeitet 31.12.2025 20:43:05
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: scsi: ipr: Fix WARNING in ipr_init() ipr_init() will not call unregister_reboot_notifier() when pci_register_driver() fails, which causes a WARNING. Call unregister_reboot_notifier() when pci_register_driver() fails. notifier callback ipr_halt [ipr] already registered WARNING: CPU: 3 PID: 299 at kernel/notifier.c:29 notifier_chain_register+0x16d/0x230 Modules linked in: ipr(+) xhci_pci_renesas xhci_hcd ehci_hcd usbcore led_class gpu_sched drm_buddy video wmi drm_ttm_helper ttm drm_display_helper drm_kms_helper drm drm_panel_orientation_quirks agpgart cfbft CPU: 3 PID: 299 Comm: modprobe Tainted: G W 6.1.0-rc1-00190-g39508d23b672-dirty #332 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014 RIP: 0010:notifier_chain_register+0x16d/0x230 Call Trace: <TASK> __blocking_notifier_chain_register+0x73/0xb0 ipr_init+0x30/0x1000 [ipr] do_one_initcall+0xdb/0x480 do_init_module+0x1cf/0x680 load_module+0x6a50/0x70a0 __do_sys_finit_module+0x12f/0x1c0 do_syscall_64+0x3f/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
020b66023712b1cc42c6ab8b76e4ec13efe4a092
Version
f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa
Status
affected
Version <
e965c4a60c1daa6e24355e35d78ca8e9f195196f
Version
f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa
Status
affected
Version <
5debd337f534b122f7c5eac6557a41b5636c9b51
Version
f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa
Status
affected
Version <
eccbec017c95b9b9ecd4c05c6f5234d1487c72cc
Version
f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa
Status
affected
Version <
f4ba143b04a17559f2c85e18b47db117f40d8cf3
Version
f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa
Status
affected
Version <
e59da172059f05c594fda03a9e8a3a0e1f5116c0
Version
f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa
Status
affected
Version <
8c739021b2022fbc40f71d3fa2e9162beef0c84a
Version
f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa
Status
affected
Version <
4399a8632e5f8f1f695d91d992c7d418fb451f07
Version
f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa
Status
affected
Version <
e6f108bffc3708ddcff72324f7d40dfcd0204894
Version
f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.34
Status
affected
Version <
2.6.34
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.145 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|