CVE-2022-50850

Source
https://cve.org/CVERecord?id=CVE-2022-50850
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50850.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50850
Downstream
Related
Published
2025-12-30T12:15:27.089Z
Modified
2026-03-12T03:26:57.244516Z
Summary
scsi: ipr: Fix WARNING in ipr_init()
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: ipr: Fix WARNING in ipr_init()

iprinit() will not call unregisterrebootnotifier() when pciregisterdriver() fails, which causes a WARNING. Call unregisterrebootnotifier() when pciregister_driver() fails.

notifier callback iprhalt [ipr] already registered WARNING: CPU: 3 PID: 299 at kernel/notifier.c:29 notifierchainregister+0x16d/0x230 Modules linked in: ipr(+) xhcipcirenesas xhcihcd ehcihcd usbcore ledclass gpusched drmbuddy video wmi drmttmhelper ttm drmdisplayhelper drmkmshelper drm drmpanelorientationquirks agpgart cfbft CPU: 3 PID: 299 Comm: modprobe Tainted: G W 6.1.0-rc1-00190-g39508d23b672-dirty #332 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014 RIP: 0010:notifierchain_register+0x16d/0x230 Call Trace: <TASK> __blockingnotifierchainregister+0x73/0xb0 iprinit+0x30/0x1000 [ipr] dooneinitcall+0xdb/0x480 doinitmodule+0x1cf/0x680 load_module+0x6a50/0x70a0 _dosysfinitmodule+0x12f/0x1c0 dosyscall64+0x3f/0x90 entrySYSCALL64afterhwframe+0x63/0xcd

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50850.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa
Fixed
020b66023712b1cc42c6ab8b76e4ec13efe4a092
Fixed
e965c4a60c1daa6e24355e35d78ca8e9f195196f
Fixed
5debd337f534b122f7c5eac6557a41b5636c9b51
Fixed
eccbec017c95b9b9ecd4c05c6f5234d1487c72cc
Fixed
f4ba143b04a17559f2c85e18b47db117f40d8cf3
Fixed
e59da172059f05c594fda03a9e8a3a0e1f5116c0
Fixed
8c739021b2022fbc40f71d3fa2e9162beef0c84a
Fixed
4399a8632e5f8f1f695d91d992c7d418fb451f07
Fixed
e6f108bffc3708ddcff72324f7d40dfcd0204894

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50850.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.34
Fixed
4.9.337
Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.14.303
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.270
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.229
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.163
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.86
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.16
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50850.json"