| Name | CVE-2022-50298 | 
| Description | In the Linux kernel, the following vulnerability has been resolved:  slimbus: qcom-ngd: cleanup in probe error path  Add proper error path in probe() to cleanup resources previously acquired/allocated to fix warnings visible during probe deferral:    notifier callback qcom_slim_ngd_ssr_notify already registered   WARNING: CPU: 6 PID: 70 at kernel/notifier.c:28 notifier_chain_register+0x5c/0x90   Modules linked in:   CPU: 6 PID: 70 Comm: kworker/u16:1 Not tainted 6.0.0-rc3-next-20220830 #380   Call trace:    notifier_chain_register+0x5c/0x90    srcu_notifier_chain_register+0x44/0x90    qcom_register_ssr_notifier+0x38/0x4c    qcom_slim_ngd_ctrl_probe+0xd8/0x400    platform_probe+0x6c/0xe0    really_probe+0xbc/0x2d4    __driver_probe_device+0x78/0xe0    driver_probe_device+0x3c/0x12c    __device_attach_driver+0xb8/0x120    bus_for_each_drv+0x78/0xd0    __device_attach+0xa8/0x1c0    device_initial_probe+0x18/0x24    bus_probe_device+0xa0/0xac    deferred_probe_work_func+0x88/0xc0    process_one_work+0x1d4/0x320    worker_thread+0x2cc/0x44c    kthread+0x110/0x114    ret_from_fork+0x10/0x20 | 
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) | 
The table below lists information on source packages.
The information below is based on the following data on fixed versions.