Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-48758

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-20 Jun, 2024 | 11:13
Updated At-04 May, 2025 | 08:22
Rejected At-
Credits

scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()

In the Linux kernel, the following vulnerability has been resolved: scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() The bnx2fc_destroy() functions are removing the interface before calling destroy_work. This results multiple WARNings from sysfs_remove_group() as the controller rport device attributes are removed too early. Replace the fcoe_port's destroy_work queue. It's not needed. The problem is easily reproducible with the following steps. Example: $ dmesg -w & $ systemctl enable --now fcoe $ fipvlan -s -c ens2f1 $ fcoeadm -d ens2f1.802 [ 583.464488] host2: libfc: Link down on port (7500a1) [ 583.472651] bnx2fc: 7500a1 - rport not created Yet!! [ 583.490468] ------------[ cut here ]------------ [ 583.538725] sysfs group 'power' not found for kobject 'rport-2:0-0' [ 583.568814] WARNING: CPU: 3 PID: 192 at fs/sysfs/group.c:279 sysfs_remove_group+0x6f/0x80 [ 583.607130] Modules linked in: dm_service_time 8021q garp mrp stp llc bnx2fc cnic uio rpcsec_gss_krb5 auth_rpcgss nfsv4 ... [ 583.942994] CPU: 3 PID: 192 Comm: kworker/3:2 Kdump: loaded Not tainted 5.14.0-39.el9.x86_64 #1 [ 583.984105] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013 [ 584.016535] Workqueue: fc_wq_2 fc_rport_final_delete [scsi_transport_fc] [ 584.050691] RIP: 0010:sysfs_remove_group+0x6f/0x80 [ 584.074725] Code: ff 5b 48 89 ef 5d 41 5c e9 ee c0 ff ff 48 89 ef e8 f6 b8 ff ff eb d1 49 8b 14 24 48 8b 33 48 c7 c7 ... [ 584.162586] RSP: 0018:ffffb567c15afdc0 EFLAGS: 00010282 [ 584.188225] RAX: 0000000000000000 RBX: ffffffff8eec4220 RCX: 0000000000000000 [ 584.221053] RDX: ffff8c1586ce84c0 RSI: ffff8c1586cd7cc0 RDI: ffff8c1586cd7cc0 [ 584.255089] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffb567c15afc00 [ 584.287954] R10: ffffb567c15afbf8 R11: ffffffff8fbe7f28 R12: ffff8c1486326400 [ 584.322356] R13: ffff8c1486326480 R14: ffff8c1483a4a000 R15: 0000000000000004 [ 584.355379] FS: 0000000000000000(0000) GS:ffff8c1586cc0000(0000) knlGS:0000000000000000 [ 584.394419] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 584.421123] CR2: 00007fe95a6f7840 CR3: 0000000107674002 CR4: 00000000000606e0 [ 584.454888] Call Trace: [ 584.466108] device_del+0xb2/0x3e0 [ 584.481701] device_unregister+0x13/0x60 [ 584.501306] bsg_unregister_queue+0x5b/0x80 [ 584.522029] bsg_remove_queue+0x1c/0x40 [ 584.541884] fc_rport_final_delete+0xf3/0x1d0 [scsi_transport_fc] [ 584.573823] process_one_work+0x1e3/0x3b0 [ 584.592396] worker_thread+0x50/0x3b0 [ 584.609256] ? rescuer_thread+0x370/0x370 [ 584.628877] kthread+0x149/0x170 [ 584.643673] ? set_kthread_struct+0x40/0x40 [ 584.662909] ret_from_fork+0x22/0x30 [ 584.680002] ---[ end trace 53575ecefa942ece ]---

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:20 Jun, 2024 | 11:13
Updated At:04 May, 2025 | 08:22
Rejected At:
▼CVE Numbering Authority (CNA)
scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()

In the Linux kernel, the following vulnerability has been resolved: scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() The bnx2fc_destroy() functions are removing the interface before calling destroy_work. This results multiple WARNings from sysfs_remove_group() as the controller rport device attributes are removed too early. Replace the fcoe_port's destroy_work queue. It's not needed. The problem is easily reproducible with the following steps. Example: $ dmesg -w & $ systemctl enable --now fcoe $ fipvlan -s -c ens2f1 $ fcoeadm -d ens2f1.802 [ 583.464488] host2: libfc: Link down on port (7500a1) [ 583.472651] bnx2fc: 7500a1 - rport not created Yet!! [ 583.490468] ------------[ cut here ]------------ [ 583.538725] sysfs group 'power' not found for kobject 'rport-2:0-0' [ 583.568814] WARNING: CPU: 3 PID: 192 at fs/sysfs/group.c:279 sysfs_remove_group+0x6f/0x80 [ 583.607130] Modules linked in: dm_service_time 8021q garp mrp stp llc bnx2fc cnic uio rpcsec_gss_krb5 auth_rpcgss nfsv4 ... [ 583.942994] CPU: 3 PID: 192 Comm: kworker/3:2 Kdump: loaded Not tainted 5.14.0-39.el9.x86_64 #1 [ 583.984105] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013 [ 584.016535] Workqueue: fc_wq_2 fc_rport_final_delete [scsi_transport_fc] [ 584.050691] RIP: 0010:sysfs_remove_group+0x6f/0x80 [ 584.074725] Code: ff 5b 48 89 ef 5d 41 5c e9 ee c0 ff ff 48 89 ef e8 f6 b8 ff ff eb d1 49 8b 14 24 48 8b 33 48 c7 c7 ... [ 584.162586] RSP: 0018:ffffb567c15afdc0 EFLAGS: 00010282 [ 584.188225] RAX: 0000000000000000 RBX: ffffffff8eec4220 RCX: 0000000000000000 [ 584.221053] RDX: ffff8c1586ce84c0 RSI: ffff8c1586cd7cc0 RDI: ffff8c1586cd7cc0 [ 584.255089] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffb567c15afc00 [ 584.287954] R10: ffffb567c15afbf8 R11: ffffffff8fbe7f28 R12: ffff8c1486326400 [ 584.322356] R13: ffff8c1486326480 R14: ffff8c1483a4a000 R15: 0000000000000004 [ 584.355379] FS: 0000000000000000(0000) GS:ffff8c1586cc0000(0000) knlGS:0000000000000000 [ 584.394419] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 584.421123] CR2: 00007fe95a6f7840 CR3: 0000000107674002 CR4: 00000000000606e0 [ 584.454888] Call Trace: [ 584.466108] device_del+0xb2/0x3e0 [ 584.481701] device_unregister+0x13/0x60 [ 584.501306] bsg_unregister_queue+0x5b/0x80 [ 584.522029] bsg_remove_queue+0x1c/0x40 [ 584.541884] fc_rport_final_delete+0xf3/0x1d0 [scsi_transport_fc] [ 584.573823] process_one_work+0x1e3/0x3b0 [ 584.592396] worker_thread+0x50/0x3b0 [ 584.609256] ? rescuer_thread+0x370/0x370 [ 584.628877] kthread+0x149/0x170 [ 584.643673] ? set_kthread_struct+0x40/0x40 [ 584.662909] ret_from_fork+0x22/0x30 [ 584.680002] ---[ end trace 53575ecefa942ece ]---

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/scsi/bnx2fc/bnx2fc_fcoe.c
Default Status
unaffected
Versions
Affected
  • From 0cbf32e1681d870632a1772601cbaadd996dc978 before 2a12fe8248a38437b95b942bbe85aced72e6e2eb (git)
  • From 0cbf32e1681d870632a1772601cbaadd996dc978 before 262550f29c750f7876b6ed1244281e72b64ebffb (git)
  • From 0cbf32e1681d870632a1772601cbaadd996dc978 before c93a290c862ccfa404e42d7420565730d67cbff9 (git)
  • From 0cbf32e1681d870632a1772601cbaadd996dc978 before de6336b17a1376db1c0f7a528cce8783db0881c0 (git)
  • From 0cbf32e1681d870632a1772601cbaadd996dc978 before bf2bd892a0cb14dd2d21f2c658f4b747813be311 (git)
  • From 0cbf32e1681d870632a1772601cbaadd996dc978 before 00849de10f798a9538242824a51b1756e7110754 (git)
  • From 0cbf32e1681d870632a1772601cbaadd996dc978 before b11e34f7bab21df36f02a5e54fb69e858c09a65d (git)
  • From 0cbf32e1681d870632a1772601cbaadd996dc978 before ace7b6ef41251c5fe47f629a9a922382fb7b0a6b (git)
  • From 0cbf32e1681d870632a1772601cbaadd996dc978 before 847f9ea4c5186fdb7b84297e3eeed9e340e83fce (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/scsi/bnx2fc/bnx2fc_fcoe.c
Default Status
affected
Versions
Affected
  • 3.2
Unaffected
  • From 0 before 3.2 (semver)
  • From 4.4.302 through 4.4.* (semver)
  • From 4.9.300 through 4.9.* (semver)
  • From 4.14.265 through 4.14.* (semver)
  • From 4.19.228 through 4.19.* (semver)
  • From 5.4.176 through 5.4.* (semver)
  • From 5.10.96 through 5.10.* (semver)
  • From 5.15.19 through 5.15.* (semver)
  • From 5.16.5 through 5.16.* (semver)
  • From 5.17 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/2a12fe8248a38437b95b942bbe85aced72e6e2eb
N/A
https://git.kernel.org/stable/c/262550f29c750f7876b6ed1244281e72b64ebffb
N/A
https://git.kernel.org/stable/c/c93a290c862ccfa404e42d7420565730d67cbff9
N/A
https://git.kernel.org/stable/c/de6336b17a1376db1c0f7a528cce8783db0881c0
N/A
https://git.kernel.org/stable/c/bf2bd892a0cb14dd2d21f2c658f4b747813be311
N/A
https://git.kernel.org/stable/c/00849de10f798a9538242824a51b1756e7110754
N/A
https://git.kernel.org/stable/c/b11e34f7bab21df36f02a5e54fb69e858c09a65d
N/A
https://git.kernel.org/stable/c/ace7b6ef41251c5fe47f629a9a922382fb7b0a6b
N/A
https://git.kernel.org/stable/c/847f9ea4c5186fdb7b84297e3eeed9e340e83fce
N/A
Hyperlink: https://git.kernel.org/stable/c/2a12fe8248a38437b95b942bbe85aced72e6e2eb
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/262550f29c750f7876b6ed1244281e72b64ebffb
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c93a290c862ccfa404e42d7420565730d67cbff9
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/de6336b17a1376db1c0f7a528cce8783db0881c0
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/bf2bd892a0cb14dd2d21f2c658f4b747813be311
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/00849de10f798a9538242824a51b1756e7110754
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b11e34f7bab21df36f02a5e54fb69e858c09a65d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/ace7b6ef41251c5fe47f629a9a922382fb7b0a6b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/847f9ea4c5186fdb7b84297e3eeed9e340e83fce
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/2a12fe8248a38437b95b942bbe85aced72e6e2eb
x_transferred
https://git.kernel.org/stable/c/262550f29c750f7876b6ed1244281e72b64ebffb
x_transferred
https://git.kernel.org/stable/c/c93a290c862ccfa404e42d7420565730d67cbff9
x_transferred
https://git.kernel.org/stable/c/de6336b17a1376db1c0f7a528cce8783db0881c0
x_transferred
https://git.kernel.org/stable/c/bf2bd892a0cb14dd2d21f2c658f4b747813be311
x_transferred
https://git.kernel.org/stable/c/00849de10f798a9538242824a51b1756e7110754
x_transferred
https://git.kernel.org/stable/c/b11e34f7bab21df36f02a5e54fb69e858c09a65d
x_transferred
https://git.kernel.org/stable/c/ace7b6ef41251c5fe47f629a9a922382fb7b0a6b
x_transferred
https://git.kernel.org/stable/c/847f9ea4c5186fdb7b84297e3eeed9e340e83fce
x_transferred
Hyperlink: https://git.kernel.org/stable/c/2a12fe8248a38437b95b942bbe85aced72e6e2eb
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/262550f29c750f7876b6ed1244281e72b64ebffb
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/c93a290c862ccfa404e42d7420565730d67cbff9
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/de6336b17a1376db1c0f7a528cce8783db0881c0
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/bf2bd892a0cb14dd2d21f2c658f4b747813be311
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/00849de10f798a9538242824a51b1756e7110754
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/b11e34f7bab21df36f02a5e54fb69e858c09a65d
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/ace7b6ef41251c5fe47f629a9a922382fb7b0a6b
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/847f9ea4c5186fdb7b84297e3eeed9e340e83fce
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:20 Jun, 2024 | 12:15
Updated At:29 Sep, 2025 | 17:23

In the Linux kernel, the following vulnerability has been resolved: scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() The bnx2fc_destroy() functions are removing the interface before calling destroy_work. This results multiple WARNings from sysfs_remove_group() as the controller rport device attributes are removed too early. Replace the fcoe_port's destroy_work queue. It's not needed. The problem is easily reproducible with the following steps. Example: $ dmesg -w & $ systemctl enable --now fcoe $ fipvlan -s -c ens2f1 $ fcoeadm -d ens2f1.802 [ 583.464488] host2: libfc: Link down on port (7500a1) [ 583.472651] bnx2fc: 7500a1 - rport not created Yet!! [ 583.490468] ------------[ cut here ]------------ [ 583.538725] sysfs group 'power' not found for kobject 'rport-2:0-0' [ 583.568814] WARNING: CPU: 3 PID: 192 at fs/sysfs/group.c:279 sysfs_remove_group+0x6f/0x80 [ 583.607130] Modules linked in: dm_service_time 8021q garp mrp stp llc bnx2fc cnic uio rpcsec_gss_krb5 auth_rpcgss nfsv4 ... [ 583.942994] CPU: 3 PID: 192 Comm: kworker/3:2 Kdump: loaded Not tainted 5.14.0-39.el9.x86_64 #1 [ 583.984105] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013 [ 584.016535] Workqueue: fc_wq_2 fc_rport_final_delete [scsi_transport_fc] [ 584.050691] RIP: 0010:sysfs_remove_group+0x6f/0x80 [ 584.074725] Code: ff 5b 48 89 ef 5d 41 5c e9 ee c0 ff ff 48 89 ef e8 f6 b8 ff ff eb d1 49 8b 14 24 48 8b 33 48 c7 c7 ... [ 584.162586] RSP: 0018:ffffb567c15afdc0 EFLAGS: 00010282 [ 584.188225] RAX: 0000000000000000 RBX: ffffffff8eec4220 RCX: 0000000000000000 [ 584.221053] RDX: ffff8c1586ce84c0 RSI: ffff8c1586cd7cc0 RDI: ffff8c1586cd7cc0 [ 584.255089] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffb567c15afc00 [ 584.287954] R10: ffffb567c15afbf8 R11: ffffffff8fbe7f28 R12: ffff8c1486326400 [ 584.322356] R13: ffff8c1486326480 R14: ffff8c1483a4a000 R15: 0000000000000004 [ 584.355379] FS: 0000000000000000(0000) GS:ffff8c1586cc0000(0000) knlGS:0000000000000000 [ 584.394419] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 584.421123] CR2: 00007fe95a6f7840 CR3: 0000000107674002 CR4: 00000000000606e0 [ 584.454888] Call Trace: [ 584.466108] device_del+0xb2/0x3e0 [ 584.481701] device_unregister+0x13/0x60 [ 584.501306] bsg_unregister_queue+0x5b/0x80 [ 584.522029] bsg_remove_queue+0x1c/0x40 [ 584.541884] fc_rport_final_delete+0xf3/0x1d0 [scsi_transport_fc] [ 584.573823] process_one_work+0x1e3/0x3b0 [ 584.592396] worker_thread+0x50/0x3b0 [ 584.609256] ? rescuer_thread+0x370/0x370 [ 584.628877] kthread+0x149/0x170 [ 584.643673] ? set_kthread_struct+0x40/0x40 [ 584.662909] ret_from_fork+0x22/0x30 [ 584.680002] ---[ end trace 53575ecefa942ece ]---

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 3.2(inclusive) to 4.4.302(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.5(inclusive) to 4.9.300(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.10(inclusive) to 4.14.265(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.15(inclusive) to 4.19.228(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.20(inclusive) to 5.4.176(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.5(inclusive) to 5.10.96(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.11(inclusive) to 5.15.19(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.16(inclusive) to 5.16.5(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>5.17
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/00849de10f798a9538242824a51b1756e7110754416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/262550f29c750f7876b6ed1244281e72b64ebffb416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/2a12fe8248a38437b95b942bbe85aced72e6e2eb416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/847f9ea4c5186fdb7b84297e3eeed9e340e83fce416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/ace7b6ef41251c5fe47f629a9a922382fb7b0a6b416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/b11e34f7bab21df36f02a5e54fb69e858c09a65d416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/bf2bd892a0cb14dd2d21f2c658f4b747813be311416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/c93a290c862ccfa404e42d7420565730d67cbff9416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/de6336b17a1376db1c0f7a528cce8783db0881c0416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/00849de10f798a9538242824a51b1756e7110754af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/262550f29c750f7876b6ed1244281e72b64ebffbaf854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/2a12fe8248a38437b95b942bbe85aced72e6e2ebaf854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/847f9ea4c5186fdb7b84297e3eeed9e340e83fceaf854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/ace7b6ef41251c5fe47f629a9a922382fb7b0a6baf854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/b11e34f7bab21df36f02a5e54fb69e858c09a65daf854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/bf2bd892a0cb14dd2d21f2c658f4b747813be311af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/c93a290c862ccfa404e42d7420565730d67cbff9af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/de6336b17a1376db1c0f7a528cce8783db0881c0af854a3a-2127-422b-91ae-364da2661108
Patch
Hyperlink: https://git.kernel.org/stable/c/00849de10f798a9538242824a51b1756e7110754
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/262550f29c750f7876b6ed1244281e72b64ebffb
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/2a12fe8248a38437b95b942bbe85aced72e6e2eb
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/847f9ea4c5186fdb7b84297e3eeed9e340e83fce
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/ace7b6ef41251c5fe47f629a9a922382fb7b0a6b
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/b11e34f7bab21df36f02a5e54fb69e858c09a65d
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/bf2bd892a0cb14dd2d21f2c658f4b747813be311
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/c93a290c862ccfa404e42d7420565730d67cbff9
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/de6336b17a1376db1c0f7a528cce8783db0881c0
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/00849de10f798a9538242824a51b1756e7110754
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/262550f29c750f7876b6ed1244281e72b64ebffb
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/2a12fe8248a38437b95b942bbe85aced72e6e2eb
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/847f9ea4c5186fdb7b84297e3eeed9e340e83fce
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/ace7b6ef41251c5fe47f629a9a922382fb7b0a6b
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/b11e34f7bab21df36f02a5e54fb69e858c09a65d
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/bf2bd892a0cb14dd2d21f2c658f4b747813be311
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/c93a290c862ccfa404e42d7420565730d67cbff9
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/de6336b17a1376db1c0f7a528cce8783db0881c0
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found