๐Ÿ” CVE Alert

CVE-2022-50850

UNKNOWN 0.0

scsi: ipr: Fix WARNING in ipr_init()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: scsi: ipr: Fix WARNING in ipr_init() ipr_init() will not call unregister_reboot_notifier() when pci_register_driver() fails, which causes a WARNING. Call unregister_reboot_notifier() when pci_register_driver() fails. notifier callback ipr_halt [ipr] already registered WARNING: CPU: 3 PID: 299 at kernel/notifier.c:29 notifier_chain_register+0x16d/0x230 Modules linked in: ipr(+) xhci_pci_renesas xhci_hcd ehci_hcd usbcore led_class gpu_sched drm_buddy video wmi drm_ttm_helper ttm drm_display_helper drm_kms_helper drm drm_panel_orientation_quirks agpgart cfbft CPU: 3 PID: 299 Comm: modprobe Tainted: G W 6.1.0-rc1-00190-g39508d23b672-dirty #332 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014 RIP: 0010:notifier_chain_register+0x16d/0x230 Call Trace: <TASK> __blocking_notifier_chain_register+0x73/0xb0 ipr_init+0x30/0x1000 [ipr] do_one_initcall+0xdb/0x480 do_init_module+0x1cf/0x680 load_module+0x6a50/0x70a0 __do_sys_finit_module+0x12f/0x1c0 do_syscall_64+0x3f/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 30, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa < 020b66023712b1cc42c6ab8b76e4ec13efe4a092 f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa < e965c4a60c1daa6e24355e35d78ca8e9f195196f f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa < 5debd337f534b122f7c5eac6557a41b5636c9b51 f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa < eccbec017c95b9b9ecd4c05c6f5234d1487c72cc f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa < f4ba143b04a17559f2c85e18b47db117f40d8cf3 f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa < e59da172059f05c594fda03a9e8a3a0e1f5116c0 f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa < 8c739021b2022fbc40f71d3fa2e9162beef0c84a f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa < 4399a8632e5f8f1f695d91d992c7d418fb451f07 f72919ec2bbbe1c42cdda7857a96c0c40e1d78aa < e6f108bffc3708ddcff72324f7d40dfcd0204894
Linux / Linux
2.6.34

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/020b66023712b1cc42c6ab8b76e4ec13efe4a092 git.kernel.org: https://git.kernel.org/stable/c/e965c4a60c1daa6e24355e35d78ca8e9f195196f git.kernel.org: https://git.kernel.org/stable/c/5debd337f534b122f7c5eac6557a41b5636c9b51 git.kernel.org: https://git.kernel.org/stable/c/eccbec017c95b9b9ecd4c05c6f5234d1487c72cc git.kernel.org: https://git.kernel.org/stable/c/f4ba143b04a17559f2c85e18b47db117f40d8cf3 git.kernel.org: https://git.kernel.org/stable/c/e59da172059f05c594fda03a9e8a3a0e1f5116c0 git.kernel.org: https://git.kernel.org/stable/c/8c739021b2022fbc40f71d3fa2e9162beef0c84a git.kernel.org: https://git.kernel.org/stable/c/4399a8632e5f8f1f695d91d992c7d418fb451f07 git.kernel.org: https://git.kernel.org/stable/c/e6f108bffc3708ddcff72324f7d40dfcd0204894