Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-50335 (GCVE-0-2022-50335)
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Linux | Linux |
Version: 728356dedeff8ef999cb436c71333ef4ac51a81c Version: 728356dedeff8ef999cb436c71333ef4ac51a81c Version: 728356dedeff8ef999cb436c71333ef4ac51a81c Version: 728356dedeff8ef999cb436c71333ef4ac51a81c Version: 3665a4d9dca1bd06bc34afb72e637fe01b2776ee |
||||||
|
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/9p/client.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "1cabce56626a61f4f02452cba61ad4332a4b73f8", "status": "affected", "version": "728356dedeff8ef999cb436c71333ef4ac51a81c", "versionType": "git" }, { "lessThan": "73c47b3123b351de2d3714a72a336c0f72f203af", "status": "affected", "version": "728356dedeff8ef999cb436c71333ef4ac51a81c", "versionType": "git" }, { "lessThan": "967fc34f297e40fd2e068cf6b0c3eb4916228539", "status": "affected", "version": "728356dedeff8ef999cb436c71333ef4ac51a81c", "versionType": "git" }, { "lessThan": "26273ade77f54716e30dfd40ac6e85ceb54ac0f9", "status": "affected", "version": "728356dedeff8ef999cb436c71333ef4ac51a81c", "versionType": "git" }, { "status": "affected", "version": "3665a4d9dca1bd06bc34afb72e637fe01b2776ee", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/9p/client.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.20" }, { "lessThan": "4.20", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.86", "versionType": "semver" }, { "lessThanOrEqual": "6.0.*", "status": "unaffected", "version": "6.0.16", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.2", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.2", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.15.86", "versionStartIncluding": "4.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.0.16", "versionStartIncluding": "4.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1.2", "versionStartIncluding": "4.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.2", "versionStartIncluding": "4.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.19.57", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\n9p: set req refcount to zero to avoid uninitialized usage\n\nWhen a new request is allocated, the refcount will be zero if it is\nreused, but if the request is newly allocated from slab, it is not fully\ninitialized before being added to idr.\n\nIf the p9_read_work got a response before the refcount initiated. It will\nuse a uninitialized req, which will result in a bad request data struct.\n\nHere is the logs from syzbot.\n\nCorrupted memory at 0xffff88807eade00b [ 0xff 0x07 0x00 0x00 0x00 0x00\n0x00 0x00 . . . . . . . . ] (in kfence-#110):\n p9_fcall_fini net/9p/client.c:248 [inline]\n p9_req_put net/9p/client.c:396 [inline]\n p9_req_put+0x208/0x250 net/9p/client.c:390\n p9_client_walk+0x247/0x540 net/9p/client.c:1165\n clone_fid fs/9p/fid.h:21 [inline]\n v9fs_fid_xattr_set+0xe4/0x2b0 fs/9p/xattr.c:118\n v9fs_xattr_set fs/9p/xattr.c:100 [inline]\n v9fs_xattr_handler_set+0x6f/0x120 fs/9p/xattr.c:159\n __vfs_setxattr+0x119/0x180 fs/xattr.c:182\n __vfs_setxattr_noperm+0x129/0x5f0 fs/xattr.c:216\n __vfs_setxattr_locked+0x1d3/0x260 fs/xattr.c:277\n vfs_setxattr+0x143/0x340 fs/xattr.c:309\n setxattr+0x146/0x160 fs/xattr.c:617\n path_setxattr+0x197/0x1c0 fs/xattr.c:636\n __do_sys_setxattr fs/xattr.c:652 [inline]\n __se_sys_setxattr fs/xattr.c:648 [inline]\n __ia32_sys_setxattr+0xc0/0x160 fs/xattr.c:648\n do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]\n __do_fast_syscall_32+0x65/0xf0 arch/x86/entry/common.c:178\n do_fast_syscall_32+0x33/0x70 arch/x86/entry/common.c:203\n entry_SYSENTER_compat_after_hwframe+0x70/0x82\n\nBelow is a similar scenario, the scenario in the syzbot log looks more\ncomplicated than this one, but this patch can fix it.\n\n T21124 p9_read_work\n======================== second trans =================================\np9_client_walk\n p9_client_rpc\n p9_client_prepare_req\n p9_tag_alloc\n req = kmem_cache_alloc(p9_req_cache, GFP_NOFS);\n tag = idr_alloc\n \u003c\u003c preempted \u003e\u003e\n req-\u003etc.tag = tag;\n /* req-\u003e[refcount/tag] == uninitialized */\n m-\u003erreq = p9_tag_lookup(m-\u003eclient, m-\u003erc.tag);\n /* increments uninitalized refcount */\n\n refcount_set(\u0026req-\u003erefcount, 2);\n /* cb drops one ref */\n p9_client_cb(req)\n /* reader thread drops its ref:\n request is incorrectly freed */\n p9_req_put(req)\n /* use after free and ref underflow */\n p9_req_put(req)\n\nTo fix it, we can initialize the refcount to zero before add to idr." } ], "providerMetadata": { "dateUpdated": "2025-09-15T14:49:50.150Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/1cabce56626a61f4f02452cba61ad4332a4b73f8" }, { "url": "https://git.kernel.org/stable/c/73c47b3123b351de2d3714a72a336c0f72f203af" }, { "url": "https://git.kernel.org/stable/c/967fc34f297e40fd2e068cf6b0c3eb4916228539" }, { "url": "https://git.kernel.org/stable/c/26273ade77f54716e30dfd40ac6e85ceb54ac0f9" } ], "title": "9p: set req refcount to zero to avoid uninitialized usage", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2022-50335", "datePublished": "2025-09-15T14:49:50.150Z", "dateReserved": "2025-09-15T14:18:36.816Z", "dateUpdated": "2025-09-15T14:49:50.150Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-50335\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-15T15:15:45.817\",\"lastModified\":\"2025-09-15T15:22:27.090\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\n9p: set req refcount to zero to avoid uninitialized usage\\n\\nWhen a new request is allocated, the refcount will be zero if it is\\nreused, but if the request is newly allocated from slab, it is not fully\\ninitialized before being added to idr.\\n\\nIf the p9_read_work got a response before the refcount initiated. It will\\nuse a uninitialized req, which will result in a bad request data struct.\\n\\nHere is the logs from syzbot.\\n\\nCorrupted memory at 0xffff88807eade00b [ 0xff 0x07 0x00 0x00 0x00 0x00\\n0x00 0x00 . . . . . . . . ] (in kfence-#110):\\n p9_fcall_fini net/9p/client.c:248 [inline]\\n p9_req_put net/9p/client.c:396 [inline]\\n p9_req_put+0x208/0x250 net/9p/client.c:390\\n p9_client_walk+0x247/0x540 net/9p/client.c:1165\\n clone_fid fs/9p/fid.h:21 [inline]\\n v9fs_fid_xattr_set+0xe4/0x2b0 fs/9p/xattr.c:118\\n v9fs_xattr_set fs/9p/xattr.c:100 [inline]\\n v9fs_xattr_handler_set+0x6f/0x120 fs/9p/xattr.c:159\\n __vfs_setxattr+0x119/0x180 fs/xattr.c:182\\n __vfs_setxattr_noperm+0x129/0x5f0 fs/xattr.c:216\\n __vfs_setxattr_locked+0x1d3/0x260 fs/xattr.c:277\\n vfs_setxattr+0x143/0x340 fs/xattr.c:309\\n setxattr+0x146/0x160 fs/xattr.c:617\\n path_setxattr+0x197/0x1c0 fs/xattr.c:636\\n __do_sys_setxattr fs/xattr.c:652 [inline]\\n __se_sys_setxattr fs/xattr.c:648 [inline]\\n __ia32_sys_setxattr+0xc0/0x160 fs/xattr.c:648\\n do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]\\n __do_fast_syscall_32+0x65/0xf0 arch/x86/entry/common.c:178\\n do_fast_syscall_32+0x33/0x70 arch/x86/entry/common.c:203\\n entry_SYSENTER_compat_after_hwframe+0x70/0x82\\n\\nBelow is a similar scenario, the scenario in the syzbot log looks more\\ncomplicated than this one, but this patch can fix it.\\n\\n T21124 p9_read_work\\n======================== second trans =================================\\np9_client_walk\\n p9_client_rpc\\n p9_client_prepare_req\\n p9_tag_alloc\\n req = kmem_cache_alloc(p9_req_cache, GFP_NOFS);\\n tag = idr_alloc\\n \u003c\u003c preempted \u003e\u003e\\n req-\u003etc.tag = tag;\\n /* req-\u003e[refcount/tag] == uninitialized */\\n m-\u003erreq = p9_tag_lookup(m-\u003eclient, m-\u003erc.tag);\\n /* increments uninitalized refcount */\\n\\n refcount_set(\u0026req-\u003erefcount, 2);\\n /* cb drops one ref */\\n p9_client_cb(req)\\n /* reader thread drops its ref:\\n request is incorrectly freed */\\n p9_req_put(req)\\n /* use after free and ref underflow */\\n p9_req_put(req)\\n\\nTo fix it, we can initialize the refcount to zero before add to idr.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1cabce56626a61f4f02452cba61ad4332a4b73f8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/26273ade77f54716e30dfd40ac6e85ceb54ac0f9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/73c47b3123b351de2d3714a72a336c0f72f203af\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/967fc34f297e40fd2e068cf6b0c3eb4916228539\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
ghsa-pq2h-q77j-f595
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
9p: set req refcount to zero to avoid uninitialized usage
When a new request is allocated, the refcount will be zero if it is reused, but if the request is newly allocated from slab, it is not fully initialized before being added to idr.
If the p9_read_work got a response before the refcount initiated. It will use a uninitialized req, which will result in a bad request data struct.
Here is the logs from syzbot.
Corrupted memory at 0xffff88807eade00b [ 0xff 0x07 0x00 0x00 0x00 0x00 0x00 0x00 . . . . . . . . ] (in kfence-#110): p9_fcall_fini net/9p/client.c:248 [inline] p9_req_put net/9p/client.c:396 [inline] p9_req_put+0x208/0x250 net/9p/client.c:390 p9_client_walk+0x247/0x540 net/9p/client.c:1165 clone_fid fs/9p/fid.h:21 [inline] v9fs_fid_xattr_set+0xe4/0x2b0 fs/9p/xattr.c:118 v9fs_xattr_set fs/9p/xattr.c:100 [inline] v9fs_xattr_handler_set+0x6f/0x120 fs/9p/xattr.c:159 __vfs_setxattr+0x119/0x180 fs/xattr.c:182 __vfs_setxattr_noperm+0x129/0x5f0 fs/xattr.c:216 __vfs_setxattr_locked+0x1d3/0x260 fs/xattr.c:277 vfs_setxattr+0x143/0x340 fs/xattr.c:309 setxattr+0x146/0x160 fs/xattr.c:617 path_setxattr+0x197/0x1c0 fs/xattr.c:636 __do_sys_setxattr fs/xattr.c:652 [inline] __se_sys_setxattr fs/xattr.c:648 [inline] __ia32_sys_setxattr+0xc0/0x160 fs/xattr.c:648 do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline] __do_fast_syscall_32+0x65/0xf0 arch/x86/entry/common.c:178 do_fast_syscall_32+0x33/0x70 arch/x86/entry/common.c:203 entry_SYSENTER_compat_after_hwframe+0x70/0x82
Below is a similar scenario, the scenario in the syzbot log looks more complicated than this one, but this patch can fix it.
T21124 p9_read_work
======================== second trans ================================= p9_client_walk p9_client_rpc p9_client_prepare_req p9_tag_alloc req = kmem_cache_alloc(p9_req_cache, GFP_NOFS); tag = idr_alloc << preempted >> req->tc.tag = tag; / req->[refcount/tag] == uninitialized / m->rreq = p9_tag_lookup(m->client, m->rc.tag); / increments uninitalized refcount /
refcount_set(&req->refcount, 2);
/* cb drops one ref */
p9_client_cb(req)
/* reader thread drops its ref:
request is incorrectly freed */
p9_req_put(req)
/* use after free and ref underflow */
p9_req_put(req)
To fix it, we can initialize the refcount to zero before add to idr.
{ "affected": [], "aliases": [ "CVE-2022-50335" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-09-15T15:15:45Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\n9p: set req refcount to zero to avoid uninitialized usage\n\nWhen a new request is allocated, the refcount will be zero if it is\nreused, but if the request is newly allocated from slab, it is not fully\ninitialized before being added to idr.\n\nIf the p9_read_work got a response before the refcount initiated. It will\nuse a uninitialized req, which will result in a bad request data struct.\n\nHere is the logs from syzbot.\n\nCorrupted memory at 0xffff88807eade00b [ 0xff 0x07 0x00 0x00 0x00 0x00\n0x00 0x00 . . . . . . . . ] (in kfence-#110):\n p9_fcall_fini net/9p/client.c:248 [inline]\n p9_req_put net/9p/client.c:396 [inline]\n p9_req_put+0x208/0x250 net/9p/client.c:390\n p9_client_walk+0x247/0x540 net/9p/client.c:1165\n clone_fid fs/9p/fid.h:21 [inline]\n v9fs_fid_xattr_set+0xe4/0x2b0 fs/9p/xattr.c:118\n v9fs_xattr_set fs/9p/xattr.c:100 [inline]\n v9fs_xattr_handler_set+0x6f/0x120 fs/9p/xattr.c:159\n __vfs_setxattr+0x119/0x180 fs/xattr.c:182\n __vfs_setxattr_noperm+0x129/0x5f0 fs/xattr.c:216\n __vfs_setxattr_locked+0x1d3/0x260 fs/xattr.c:277\n vfs_setxattr+0x143/0x340 fs/xattr.c:309\n setxattr+0x146/0x160 fs/xattr.c:617\n path_setxattr+0x197/0x1c0 fs/xattr.c:636\n __do_sys_setxattr fs/xattr.c:652 [inline]\n __se_sys_setxattr fs/xattr.c:648 [inline]\n __ia32_sys_setxattr+0xc0/0x160 fs/xattr.c:648\n do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]\n __do_fast_syscall_32+0x65/0xf0 arch/x86/entry/common.c:178\n do_fast_syscall_32+0x33/0x70 arch/x86/entry/common.c:203\n entry_SYSENTER_compat_after_hwframe+0x70/0x82\n\nBelow is a similar scenario, the scenario in the syzbot log looks more\ncomplicated than this one, but this patch can fix it.\n\n T21124 p9_read_work\n======================== second trans =================================\np9_client_walk\n p9_client_rpc\n p9_client_prepare_req\n p9_tag_alloc\n req = kmem_cache_alloc(p9_req_cache, GFP_NOFS);\n tag = idr_alloc\n \u003c\u003c preempted \u003e\u003e\n req-\u003etc.tag = tag;\n /* req-\u003e[refcount/tag] == uninitialized */\n m-\u003erreq = p9_tag_lookup(m-\u003eclient, m-\u003erc.tag);\n /* increments uninitalized refcount */\n\n refcount_set(\u0026req-\u003erefcount, 2);\n /* cb drops one ref */\n p9_client_cb(req)\n /* reader thread drops its ref:\n request is incorrectly freed */\n p9_req_put(req)\n /* use after free and ref underflow */\n p9_req_put(req)\n\nTo fix it, we can initialize the refcount to zero before add to idr.", "id": "GHSA-pq2h-q77j-f595", "modified": "2025-09-15T15:31:28Z", "published": "2025-09-15T15:31:27Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50335" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/1cabce56626a61f4f02452cba61ad4332a4b73f8" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/26273ade77f54716e30dfd40ac6e85ceb54ac0f9" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/73c47b3123b351de2d3714a72a336c0f72f203af" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/967fc34f297e40fd2e068cf6b0c3eb4916228539" } ], "schema_version": "1.4.0", "severity": [] }
wid-sec-w-2025-2053
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder nicht n\u00e4her beschriebene Auswirkungen zu erzielen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-2053 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2053.json" }, { "category": "self", "summary": "WID-SEC-2025-2053 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2053" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50234", "url": "https://lore.kernel.org/linux-cve-announce/2025091545-CVE-2022-50234-bd01@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50235", "url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50235-a5c0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50236", "url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50236-dc41@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50239", "url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50239-3908@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50240", "url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50240-6e40@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50241", "url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50241-0f92@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50242", "url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50242-9a25@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50243", "url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50243-4311@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50244", "url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50244-4e09@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50245", "url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50245-57e4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50246", "url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50246-d173@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50247", "url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50247-1ab7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50248", "url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50248-edcb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50249", "url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50249-bfbe@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50250", "url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50250-1be1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50251", "url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50251-c216@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50252", "url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50252-5c96@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50253", "url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50253-1ed7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50254", "url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50254-c910@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50255", "url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50255-c5ec@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50256", "url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50256-069f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50257", "url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50257-648e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50258", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2022-50258-1497@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50259", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2022-50259-6276@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50260", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2022-50260-a136@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50261", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2022-50261-9892@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50262", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2022-50262-0645@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50263", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2022-50263-040c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50264", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50264-3988@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50265", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50265-509d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50266", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50266-9532@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50267", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50267-2de9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50268", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50268-bcdf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50269", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50269-24d9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50270", "url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50270-5b28@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50271", "url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50271-2175@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50272", "url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50272-4120@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50273", "url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50273-5521@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50274", "url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50274-ad8d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50275", "url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50275-2ef2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50276", "url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50276-e9a6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50277", "url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50277-085f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50278", "url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50278-fcc9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50279", "url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50279-412b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50280", "url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50280-762f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50281", "url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50281-f141@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50282", "url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50282-322d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50283", "url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50283-d21e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50284", "url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50284-b5c2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50285", "url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50285-955c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50286", "url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50286-b313@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50287", "url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50287-a3ce@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50288", "url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50288-3421@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50289", "url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50289-1532@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50290", "url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50290-a7af@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50291", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50291-82e7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50292", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50292-cb74@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50293", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50293-2dbe@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50294", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50294-7c87@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50295", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50295-8141@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50296", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50296-7d7e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50297", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50297-974e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50298", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50298-06f8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50299", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50299-9449@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50300", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50300-203c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50301", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50301-c26c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50302", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50302-89ee@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50303", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50303-7759@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50304", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50304-4b20@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50305", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50305-8aba@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50306", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50306-c1da@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50307", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50307-3240@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50308", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50308-8b1d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50309", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50309-f82b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50310", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50310-aa10@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50311", "url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50311-0c21@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50312", "url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50312-105d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50313", "url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50313-2fa9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50314", "url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50314-9a10@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50315", "url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50315-a3b8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50316", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2022-50316-6e9e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50317", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2022-50317-6b3b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50318", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2022-50318-6f5e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50319", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50319-6747@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50320", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50320-5ffa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50321", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50321-bba8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50322", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50322-079d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50323", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50323-a29f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50324", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50324-e9d8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50325", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50325-d6bb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50326", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50326-7ffc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50327", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50327-5d27@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50328", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50328-f996@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50329", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50329-58ac@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50330", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50330-cd49@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50331", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50331-53e1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50332", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50332-a052@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50333", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50333-d81f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50334", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50334-488d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50335", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50335-141b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50336", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50336-0b7e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50337", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50337-42aa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50338", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50338-506b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53147", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2023-53147-8f20@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53148", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53148-e1b8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53149", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53149-2f0a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53150", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53150-29b0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53151", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53151-263e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53152", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53152-130d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53153", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53153-d85c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53163", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53163-860f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53164", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53164-3a5d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53165", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53165-a7c4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53166", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53166-12e5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53167", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53167-3fb7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53168", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53168-7628@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53169", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53169-0678@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53170", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53170-d187@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53171", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53171-be9f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53172", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53172-3f93@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53173", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53173-4180@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53174", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53174-ed92@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53175", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53175-66fa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53176", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53176-4194@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53177", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53177-9a91@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53178", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53178-9d27@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53179", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53179-eb55@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53180", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53180-5e16@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53181", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53181-608c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53182", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53182-dcdb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53183", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53183-b15d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53184", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53184-3b7a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53185", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53185-2f8d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53186", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53186-25a4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53187", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53187-fb77@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53188", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53188-373f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53189", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53189-19c2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53190", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53190-0dfe@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53191", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53191-7baa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53192", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53192-5ca6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53193", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53193-74f6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53194", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53194-1804@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53195", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53195-a853@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53196", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53196-c59a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53197", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53197-1f23@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53198", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53198-094a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53199", "url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53199-8a8c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53200", "url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53200-a0c8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53201", "url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53201-baf1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53202", "url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53202-5e01@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53203", "url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53203-4a9c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53204", "url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53204-3e15@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53205", "url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53205-9a2b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53206", "url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53206-33fc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53207", "url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53207-5025@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53208", "url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53208-b31d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53209", "url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53209-ed9e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53210", "url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53210-0e06@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53211", "url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53211-6015@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53212", "url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53212-fdd4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53213", "url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53213-dfc5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53214", "url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53214-87f5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53215", "url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53215-8895@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53216", "url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53216-7693@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53217", "url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53217-0de0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53218", "url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53218-0fca@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53219", "url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53219-bd20@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53220", "url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53220-e514@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53221", "url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53221-c23e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53222", "url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53222-c1a9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53223", "url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53223-ee66@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53224", "url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53224-190d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53225", "url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53225-5ed5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53226", "url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53226-a44a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53227", "url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53227-6a15@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53228", "url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53228-441c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53229", "url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53229-a0ef@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53230", "url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53230-6c94@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53231", "url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53231-7743@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53232", "url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53232-39fa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53233", "url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53233-8c6b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53234", "url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53234-5a07@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53235", "url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53235-1104@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53236", "url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53236-49ad@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53237", "url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53237-7d1b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53238", "url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53238-f8a7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53239", "url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53239-9ea0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53240", "url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53240-c379@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53241", "url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53241-c75a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53242", "url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53242-b7c5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53243", "url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53243-bac7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53244", "url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53244-197d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53245", "url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53245-256b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53246", "url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53246-a539@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53247", "url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53247-60a0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53248", "url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53248-aa39@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53249", "url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53249-aab7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53250", "url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53250-05ea@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53251", "url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53251-8d43@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53252", "url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53252-3a4f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53253", "url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53253-c59c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53254", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53254-0aa0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53255", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53255-ba5b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53256", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53256-d5af@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53257", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53257-6162@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53258", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53258-35f0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53259", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53259-5409@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53260", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2023-53260-2323@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53261", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2023-53261-6a1a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53262", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2023-53262-822a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39800", "url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2025-39800-6b30@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39801", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2025-39801-00f9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39802", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2025-39802-fba9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39803", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2025-39803-eb8e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39804", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2025-39804-bf3b@gregkh/" }, { "category": "external", "summary": "Debian Security Advisory DSA-6009 vom 2025-09-23", "url": "https://lists.debian.org/debian-security-announce/2025/msg00173.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-6008 vom 2025-09-23", "url": "https://lists.debian.org/debian-security-announce/2025/msg00172.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-09-22T22:00:00.000+00:00", "generator": { "date": "2025-09-23T04:57:08.189+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-2053", "initial_release_date": "2025-09-15T22:00:00.000+00:00", "revision_history": [ { "date": "2025-09-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-09-16T22:00:00.000+00:00", "number": "2", "summary": "Referenz(en) aufgenommen: EUVD-2023-59886, EUVD-2023-59887, EUVD-2023-59888, EUVD-2023-59889, EUVD-2023-59890, EUVD-2023-59891, EUVD-2023-59892, EUVD-2023-59913, EUVD-2023-59923" }, { "date": "2025-09-22T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T028463", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:unspecified" } } } ], "category": "vendor", "name": "Open Source" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-50234", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50234" }, { "cve": "CVE-2022-50235", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50235" }, { "cve": "CVE-2022-50236", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50236" }, { "cve": "CVE-2022-50239", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50239" }, { "cve": "CVE-2022-50240", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50240" }, { "cve": "CVE-2022-50241", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50241" }, { "cve": "CVE-2022-50242", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50242" }, { "cve": "CVE-2022-50243", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50243" }, { "cve": "CVE-2022-50244", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50244" }, { "cve": "CVE-2022-50245", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50245" }, { "cve": "CVE-2022-50246", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50246" }, { "cve": "CVE-2022-50247", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50247" }, { "cve": "CVE-2022-50248", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50248" }, { "cve": "CVE-2022-50249", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50249" }, { "cve": "CVE-2022-50250", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50250" }, { "cve": "CVE-2022-50251", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50251" }, { "cve": "CVE-2022-50252", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50252" }, { "cve": "CVE-2022-50253", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50253" }, { "cve": "CVE-2022-50254", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50254" }, { "cve": "CVE-2022-50255", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50255" }, { "cve": "CVE-2022-50256", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50256" }, { "cve": "CVE-2022-50257", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50257" }, { "cve": "CVE-2022-50258", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50258" }, { "cve": "CVE-2022-50259", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50259" }, { "cve": "CVE-2022-50260", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50260" }, { "cve": "CVE-2022-50261", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50261" }, { "cve": "CVE-2022-50262", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50262" }, { "cve": "CVE-2022-50263", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50263" }, { "cve": "CVE-2022-50264", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50264" }, { "cve": "CVE-2022-50265", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50265" }, { "cve": "CVE-2022-50266", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50266" }, { "cve": "CVE-2022-50267", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50267" }, { "cve": "CVE-2022-50268", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50268" }, { "cve": "CVE-2022-50269", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50269" }, { "cve": "CVE-2022-50270", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50270" }, { "cve": "CVE-2022-50271", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50271" }, { "cve": "CVE-2022-50272", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50272" }, { "cve": "CVE-2022-50273", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50273" }, { "cve": "CVE-2022-50274", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50274" }, { "cve": "CVE-2022-50275", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50275" }, { "cve": "CVE-2022-50276", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50276" }, { "cve": "CVE-2022-50277", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50277" }, { "cve": "CVE-2022-50278", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50278" }, { "cve": "CVE-2022-50279", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50279" }, { "cve": "CVE-2022-50280", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50280" }, { "cve": "CVE-2022-50281", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50281" }, { "cve": "CVE-2022-50282", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50282" }, { "cve": "CVE-2022-50283", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50283" }, { "cve": "CVE-2022-50284", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50284" }, { "cve": "CVE-2022-50285", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50285" }, { "cve": "CVE-2022-50286", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50286" }, { "cve": "CVE-2022-50287", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50287" }, { "cve": "CVE-2022-50288", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50288" }, { "cve": "CVE-2022-50289", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50289" }, { "cve": "CVE-2022-50290", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50290" }, { "cve": "CVE-2022-50291", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50291" }, { "cve": "CVE-2022-50292", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50292" }, { "cve": "CVE-2022-50293", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50293" }, { "cve": "CVE-2022-50294", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50294" }, { "cve": "CVE-2022-50295", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50295" }, { "cve": "CVE-2022-50296", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50296" }, { "cve": "CVE-2022-50297", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50297" }, { "cve": "CVE-2022-50298", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50298" }, { "cve": "CVE-2022-50299", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50299" }, { "cve": "CVE-2022-50300", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50300" }, { "cve": "CVE-2022-50301", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50301" }, { "cve": "CVE-2022-50302", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50302" }, { "cve": "CVE-2022-50303", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50303" }, { "cve": "CVE-2022-50304", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50304" }, { "cve": "CVE-2022-50305", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50305" }, { "cve": "CVE-2022-50306", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50306" }, { "cve": "CVE-2022-50307", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50307" }, { "cve": "CVE-2022-50308", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50308" }, { "cve": "CVE-2022-50309", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50309" }, { "cve": "CVE-2022-50310", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50310" }, { "cve": "CVE-2022-50311", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50311" }, { "cve": "CVE-2022-50312", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50312" }, { "cve": "CVE-2022-50313", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50313" }, { "cve": "CVE-2022-50314", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50314" }, { "cve": "CVE-2022-50315", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50315" }, { "cve": "CVE-2022-50316", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50316" }, { "cve": "CVE-2022-50317", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50317" }, { "cve": "CVE-2022-50318", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50318" }, { "cve": "CVE-2022-50319", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50319" }, { "cve": "CVE-2022-50320", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50320" }, { "cve": "CVE-2022-50321", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50321" }, { "cve": "CVE-2022-50322", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50322" }, { "cve": "CVE-2022-50323", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50323" }, { "cve": "CVE-2022-50324", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50324" }, { "cve": "CVE-2022-50325", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50325" }, { "cve": "CVE-2022-50326", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50326" }, { "cve": "CVE-2022-50327", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50327" }, { "cve": "CVE-2022-50328", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50328" }, { "cve": "CVE-2022-50329", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50329" }, { "cve": "CVE-2022-50330", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50330" }, { "cve": "CVE-2022-50331", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50331" }, { "cve": "CVE-2022-50332", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50332" }, { "cve": "CVE-2022-50333", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50333" }, { "cve": "CVE-2022-50334", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50334" }, { "cve": "CVE-2022-50335", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50335" }, { "cve": "CVE-2022-50336", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50336" }, { "cve": "CVE-2022-50337", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50337" }, { "cve": "CVE-2022-50338", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50338" }, { "cve": "CVE-2023-3772", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-3772" }, { "cve": "CVE-2023-53147", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53147" }, { "cve": "CVE-2023-53148", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53148" }, { "cve": "CVE-2023-53149", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53149" }, { "cve": "CVE-2023-53150", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53150" }, { "cve": "CVE-2023-53151", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53151" }, { "cve": "CVE-2023-53152", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53152" }, { "cve": "CVE-2023-53153", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53153" }, { "cve": "CVE-2023-53163", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53163" }, { "cve": "CVE-2023-53164", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53164" }, { "cve": "CVE-2023-53165", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53165" }, { "cve": "CVE-2023-53166", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53166" }, { "cve": "CVE-2023-53167", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53167" }, { "cve": "CVE-2023-53168", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53168" }, { "cve": "CVE-2023-53169", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53169" }, { "cve": "CVE-2023-53170", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53170" }, { "cve": "CVE-2023-53171", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53171" }, { "cve": "CVE-2023-53172", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53172" }, { "cve": "CVE-2023-53173", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53173" }, { "cve": "CVE-2023-53174", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53174" }, { "cve": "CVE-2023-53175", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53175" }, { "cve": "CVE-2023-53176", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53176" }, { "cve": "CVE-2023-53177", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53177" }, { "cve": "CVE-2023-53178", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53178" }, { "cve": "CVE-2023-53179", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53179" }, { "cve": "CVE-2023-53180", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53180" }, { "cve": "CVE-2023-53181", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53181" }, { "cve": "CVE-2023-53182", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53182" }, { "cve": "CVE-2023-53183", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53183" }, { "cve": "CVE-2023-53184", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53184" }, { "cve": "CVE-2023-53185", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53185" }, { "cve": "CVE-2023-53186", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53186" }, { "cve": "CVE-2023-53187", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53187" }, { "cve": "CVE-2023-53188", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53188" }, { "cve": "CVE-2023-53189", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53189" }, { "cve": "CVE-2023-53190", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53190" }, { "cve": "CVE-2023-53191", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53191" }, { "cve": "CVE-2023-53192", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53192" }, { "cve": "CVE-2023-53193", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53193" }, { "cve": "CVE-2023-53194", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53194" }, { "cve": "CVE-2023-53195", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53195" }, { "cve": "CVE-2023-53196", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53196" }, { "cve": "CVE-2023-53197", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53197" }, { "cve": "CVE-2023-53198", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53198" }, { "cve": "CVE-2023-53199", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53199" }, { "cve": "CVE-2023-53200", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53200" }, { "cve": "CVE-2023-53201", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53201" }, { "cve": "CVE-2023-53202", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53202" }, { "cve": "CVE-2023-53203", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53203" }, { "cve": "CVE-2023-53204", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53204" }, { "cve": "CVE-2023-53205", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53205" }, { "cve": "CVE-2023-53206", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53206" }, { "cve": "CVE-2023-53207", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53207" }, { "cve": "CVE-2023-53208", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53208" }, { "cve": "CVE-2023-53209", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53209" }, { "cve": "CVE-2023-53210", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53210" }, { "cve": "CVE-2023-53211", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53211" }, { "cve": "CVE-2023-53212", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53212" }, { "cve": "CVE-2023-53213", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53213" }, { "cve": "CVE-2023-53214", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53214" }, { "cve": "CVE-2023-53215", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53215" }, { "cve": "CVE-2023-53216", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53216" }, { "cve": "CVE-2023-53217", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53217" }, { "cve": "CVE-2023-53218", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53218" }, { "cve": "CVE-2023-53219", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53219" }, { "cve": "CVE-2023-53220", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53220" }, { "cve": "CVE-2023-53221", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53221" }, { "cve": "CVE-2023-53222", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53222" }, { "cve": "CVE-2023-53223", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53223" }, { "cve": "CVE-2023-53224", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53224" }, { "cve": "CVE-2023-53225", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53225" }, { "cve": "CVE-2023-53226", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53226" }, { "cve": "CVE-2023-53227", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53227" }, { "cve": "CVE-2023-53228", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53228" }, { "cve": "CVE-2023-53229", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53229" }, { "cve": "CVE-2023-53230", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53230" }, { "cve": "CVE-2023-53231", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53231" }, { "cve": "CVE-2023-53232", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53232" }, { "cve": "CVE-2023-53233", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53233" }, { "cve": "CVE-2023-53234", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53234" }, { "cve": "CVE-2023-53235", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53235" }, { "cve": "CVE-2023-53236", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53236" }, { "cve": "CVE-2023-53237", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53237" }, { "cve": "CVE-2023-53238", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53238" }, { "cve": "CVE-2023-53239", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53239" }, { "cve": "CVE-2023-53240", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53240" }, { "cve": "CVE-2023-53241", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53241" }, { "cve": "CVE-2023-53242", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53242" }, { "cve": "CVE-2023-53243", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53243" }, { "cve": "CVE-2023-53244", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53244" }, { "cve": "CVE-2023-53245", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53245" }, { "cve": "CVE-2023-53246", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53246" }, { "cve": "CVE-2023-53247", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53247" }, { "cve": "CVE-2023-53248", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53248" }, { "cve": "CVE-2023-53249", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53249" }, { "cve": "CVE-2023-53250", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53250" }, { "cve": "CVE-2023-53251", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53251" }, { "cve": "CVE-2023-53252", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53252" }, { "cve": "CVE-2023-53253", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53253" }, { "cve": "CVE-2023-53254", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53254" }, { "cve": "CVE-2023-53255", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53255" }, { "cve": "CVE-2023-53256", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53256" }, { "cve": "CVE-2023-53257", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53257" }, { "cve": "CVE-2023-53258", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53258" }, { "cve": "CVE-2023-53259", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53259" }, { "cve": "CVE-2023-53260", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53260" }, { "cve": "CVE-2023-53261", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53261" }, { "cve": "CVE-2023-53262", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53262" }, { "cve": "CVE-2023-53263", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53263" }, { "cve": "CVE-2023-53264", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53264" }, { "cve": "CVE-2023-53265", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53265" }, { "cve": "CVE-2023-53266", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53266" }, { "cve": "CVE-2023-53267", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53267" }, { "cve": "CVE-2023-53268", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53268" }, { "cve": "CVE-2023-53269", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53269" }, { "cve": "CVE-2023-53270", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53270" }, { "cve": "CVE-2023-53271", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53271" }, { "cve": "CVE-2023-53272", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53272" }, { "cve": "CVE-2023-53273", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53273" }, { "cve": "CVE-2023-53274", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53274" }, { "cve": "CVE-2023-53275", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53275" }, { "cve": "CVE-2023-53276", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53276" }, { "cve": "CVE-2023-53277", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53277" }, { "cve": "CVE-2023-53278", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53278" }, { "cve": "CVE-2023-53279", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53279" }, { "cve": "CVE-2023-53280", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53280" }, { "cve": "CVE-2023-53281", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53281" }, { "cve": "CVE-2023-53282", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53282" }, { "cve": "CVE-2023-53283", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53283" }, { "cve": "CVE-2023-53284", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53284" }, { "cve": "CVE-2023-53285", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53285" }, { "cve": "CVE-2023-53286", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53286" }, { "cve": "CVE-2023-53287", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53287" }, { "cve": "CVE-2023-53288", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53288" }, { "cve": "CVE-2023-53289", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53289" }, { "cve": "CVE-2023-53290", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53290" }, { "cve": "CVE-2023-53291", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53291" }, { "cve": "CVE-2023-53292", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53292" }, { "cve": "CVE-2023-53293", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53293" }, { "cve": "CVE-2023-53294", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53294" }, { "cve": "CVE-2023-53295", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53295" }, { "cve": "CVE-2023-53296", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53296" }, { "cve": "CVE-2023-53297", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53297" }, { "cve": "CVE-2023-53298", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53298" }, { "cve": "CVE-2023-53299", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53299" }, { "cve": "CVE-2023-53300", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53300" }, { "cve": "CVE-2023-53301", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53301" }, { "cve": "CVE-2023-53302", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53302" }, { "cve": "CVE-2023-53303", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53303" }, { "cve": "CVE-2025-39800", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2025-39800" }, { "cve": "CVE-2025-39801", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2025-39801" }, { "cve": "CVE-2025-39802", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2025-39802" }, { "cve": "CVE-2025-39803", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2025-39803" }, { "cve": "CVE-2025-39804", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2025-39804" } ] }
fkie_cve-2022-50335
Vulnerability from fkie_nvd
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\n9p: set req refcount to zero to avoid uninitialized usage\n\nWhen a new request is allocated, the refcount will be zero if it is\nreused, but if the request is newly allocated from slab, it is not fully\ninitialized before being added to idr.\n\nIf the p9_read_work got a response before the refcount initiated. It will\nuse a uninitialized req, which will result in a bad request data struct.\n\nHere is the logs from syzbot.\n\nCorrupted memory at 0xffff88807eade00b [ 0xff 0x07 0x00 0x00 0x00 0x00\n0x00 0x00 . . . . . . . . ] (in kfence-#110):\n p9_fcall_fini net/9p/client.c:248 [inline]\n p9_req_put net/9p/client.c:396 [inline]\n p9_req_put+0x208/0x250 net/9p/client.c:390\n p9_client_walk+0x247/0x540 net/9p/client.c:1165\n clone_fid fs/9p/fid.h:21 [inline]\n v9fs_fid_xattr_set+0xe4/0x2b0 fs/9p/xattr.c:118\n v9fs_xattr_set fs/9p/xattr.c:100 [inline]\n v9fs_xattr_handler_set+0x6f/0x120 fs/9p/xattr.c:159\n __vfs_setxattr+0x119/0x180 fs/xattr.c:182\n __vfs_setxattr_noperm+0x129/0x5f0 fs/xattr.c:216\n __vfs_setxattr_locked+0x1d3/0x260 fs/xattr.c:277\n vfs_setxattr+0x143/0x340 fs/xattr.c:309\n setxattr+0x146/0x160 fs/xattr.c:617\n path_setxattr+0x197/0x1c0 fs/xattr.c:636\n __do_sys_setxattr fs/xattr.c:652 [inline]\n __se_sys_setxattr fs/xattr.c:648 [inline]\n __ia32_sys_setxattr+0xc0/0x160 fs/xattr.c:648\n do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]\n __do_fast_syscall_32+0x65/0xf0 arch/x86/entry/common.c:178\n do_fast_syscall_32+0x33/0x70 arch/x86/entry/common.c:203\n entry_SYSENTER_compat_after_hwframe+0x70/0x82\n\nBelow is a similar scenario, the scenario in the syzbot log looks more\ncomplicated than this one, but this patch can fix it.\n\n T21124 p9_read_work\n======================== second trans =================================\np9_client_walk\n p9_client_rpc\n p9_client_prepare_req\n p9_tag_alloc\n req = kmem_cache_alloc(p9_req_cache, GFP_NOFS);\n tag = idr_alloc\n \u003c\u003c preempted \u003e\u003e\n req-\u003etc.tag = tag;\n /* req-\u003e[refcount/tag] == uninitialized */\n m-\u003erreq = p9_tag_lookup(m-\u003eclient, m-\u003erc.tag);\n /* increments uninitalized refcount */\n\n refcount_set(\u0026req-\u003erefcount, 2);\n /* cb drops one ref */\n p9_client_cb(req)\n /* reader thread drops its ref:\n request is incorrectly freed */\n p9_req_put(req)\n /* use after free and ref underflow */\n p9_req_put(req)\n\nTo fix it, we can initialize the refcount to zero before add to idr." } ], "id": "CVE-2022-50335", "lastModified": "2025-09-15T15:22:27.090", "metrics": {}, "published": "2025-09-15T15:15:45.817", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/1cabce56626a61f4f02452cba61ad4332a4b73f8" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/26273ade77f54716e30dfd40ac6e85ceb54ac0f9" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/73c47b3123b351de2d3714a72a336c0f72f203af" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/967fc34f297e40fd2e068cf6b0c3eb4916228539" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Awaiting Analysis" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.