-
CVE-2022-50234
- EPSS 0.03%
- Published 15.09.2025 14:01:38
- Last modified 15.09.2025 15:21:42
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: io_uring/af_unix: defer registered files gc to io_uring release Instead of putting io_uring's registered files in unix_gc() we want it to be done by io_uring itself. The trick here is to consider io_uring registered files for cycle detection but not actually putting them down. Because io_uring can't register other ring instances, this will remove all refs to the ring file triggering the ->release path and clean up with io_ring_ctx_free(). [axboe: add kerneldoc comment to skb, fold in skb leak fix]
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
04df9719df1865f6770af9bc7880874af0e594b2
Version
6b06314c47e141031be043539900d80d2c7ba10f
Status
affected
Version <
c378c479c5175833bb22ff71974cda47d7b05401
Version
6b06314c47e141031be043539900d80d2c7ba10f
Status
affected
Version <
813d8fe5d30388f73a21d3a2bf46b0a1fd72498c
Version
6b06314c47e141031be043539900d80d2c7ba10f
Status
affected
Version <
b4293c01ee0d0ecdd3cb5801e13f62271144667a
Version
6b06314c47e141031be043539900d80d2c7ba10f
Status
affected
Version <
75e94c7e8859e58aadc15a98cc9704edff47d4f2
Version
6b06314c47e141031be043539900d80d2c7ba10f
Status
affected
Version <
0091bfc81741b8d3aeb3b7ab8636f911b2de6e80
Version
6b06314c47e141031be043539900d80d2c7ba10f
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
5.1
Status
affected
Version <
5.1
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.220
Status
unaffected
Version <=
5.10.*
Version
5.10.150
Status
unaffected
Version <=
5.15.*
Version
5.15.75
Status
unaffected
Version <=
5.19.*
Version
5.19.17
Status
unaffected
Version <=
6.0.*
Version
6.0.3
Status
unaffected
Version <=
*
Version
6.1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.078 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|