{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T12:44:00.142","vulnerabilities":[{"cve":{"id":"CVE-2022-50518","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-10-07T16:15:35.490","lastModified":"2026-03-17T14:15:19.117","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nparisc: Fix locking in pdc_iodc_print() firmware call\n\nUtilize pdc_lock spinlock to protect parallel modifications of the\niodc_dbuf[] buffer, check length to prevent buffer overflow of\niodc_dbuf[], drop the iodc_retbuf[] buffer and fix some wrong\nindentings."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-667"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.24.5","versionEndExcluding":"2.6.25","matchCriteriaId":"C0B10599-742F-4EF6-AEFE-B18D086B8D98"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.25.1","versionEndExcluding":"6.0.18","matchCriteriaId":"0EDD14E2-11C7-45F3-BCB5-77CFF5314663"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1","versionEndExcluding":"6.1.4","matchCriteriaId":"BC4189D9-5478-4E88-A78D-9C1DE29B217C"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.25:-:*:*:*:*:*:*","matchCriteriaId":"F650D09A-41EA-4EB5-925B-F2146E8DDF2A"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.25:rc6:*:*:*:*:*:*","matchCriteriaId":"00763CAF-AEF8-4EF1-9393-DEFF9697D382"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.25:rc7:*:*:*:*:*:*","matchCriteriaId":"2D5310FC-8432-4BBF-8174-60F7B8A608B0"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.25:rc8:*:*:*:*:*:*","matchCriteriaId":"4254F56E-6BA0-45DD-95D1-61A7C8AF7BA8"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.25:rc9:*:*:*:*:*:*","matchCriteriaId":"8957EE27-E19A-4DE6-B46D-FE413E88BD93"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/04a603058e70b8b881bb7860b8bd649f931f2591","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/553bc5890ed96a8d006224c3a4673c47fee0d12a","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/7236aae5f81f3efbd93d0601e74fc05994bc2580","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]}]}}]}