CVE-2022-50850
Unknown Unknown - Not Provided
Improper Cleanup in Linux ipr Driver Causes Kernel Warning

Publication date: 2025-12-30

Last updated on: 2025-12-30

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: scsi: ipr: Fix WARNING in ipr_init() ipr_init() will not call unregister_reboot_notifier() when pci_register_driver() fails, which causes a WARNING. Call unregister_reboot_notifier() when pci_register_driver() fails. notifier callback ipr_halt [ipr] already registered WARNING: CPU: 3 PID: 299 at kernel/notifier.c:29 notifier_chain_register+0x16d/0x230 Modules linked in: ipr(+) xhci_pci_renesas xhci_hcd ehci_hcd usbcore led_class gpu_sched drm_buddy video wmi drm_ttm_helper ttm drm_display_helper drm_kms_helper drm drm_panel_orientation_quirks agpgart cfbft CPU: 3 PID: 299 Comm: modprobe Tainted: G W 6.1.0-rc1-00190-g39508d23b672-dirty #332 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014 RIP: 0010:notifier_chain_register+0x16d/0x230 Call Trace: <TASK> __blocking_notifier_chain_register+0x73/0xb0 ipr_init+0x30/0x1000 [ipr] do_one_initcall+0xdb/0x480 do_init_module+0x1cf/0x680 load_module+0x6a50/0x70a0 __do_sys_finit_module+0x12f/0x1c0 do_syscall_64+0x3f/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-30
Last Modified
2025-12-30
Generated
2026-05-07
AI Q&A
2025-12-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel 6.1.0-rc1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking for the specific WARNING message related to ipr_init() in the system logs. You can use commands like 'dmesg | grep ipr' or 'journalctl -k | grep ipr' to look for the WARNING: 'notifier callback ipr_halt [ipr] already registered' or related messages indicating the issue.


Can you explain this vulnerability to me?

This vulnerability is related to the Linux kernel's ipr driver initialization function (ipr_init). When the pci_register_driver() call fails during initialization, ipr_init() does not call unregister_reboot_notifier(), which leads to a WARNING due to a notifier callback (ipr_halt) already being registered. The fix ensures that unregister_reboot_notifier() is called if pci_register_driver() fails, preventing this warning.


How can this vulnerability impact me? :

The impact of this vulnerability is primarily a warning message during the kernel module initialization process, indicating improper cleanup when pci_register_driver() fails. This could potentially lead to unstable or unexpected behavior during module loading, but no direct security impact or exploitation details are provided.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation involves updating the Linux kernel to a version where the ipr_init() function properly calls unregister_reboot_notifier() when pci_register_driver() fails, thus preventing the WARNING. Until then, monitoring for the warning messages and avoiding loading the ipr module if possible may reduce impact.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart