U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, product names, and impact metrics.

For information on how to cite the NVD, including the database's Digital Object Identifier (DOI), please consult NIST's Public Data Repository.

Last 20 Scored Vulnerability IDs & Summaries CVSS Severity
  • CVE-2022-49248 - In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction AV/C deferred transaction was supported at a commit 00a7bb81c20f ("ALSA: firewire-lib: Add support for d... read CVE-2022-49248
    Published: February 26, 2025; 2:01:01 AM -0500

    V3.1: 5.5 MEDIUM

  • CVE-2022-49246 - In the Linux kernel, the following vulnerability has been resolved: ASoC: atmel: Fix error handling in snd_proto_probe The device_node pointer is returned by of_parse_phandle() with refcount incremented. We should use of_node_put() on it when d... read CVE-2022-49246
    Published: February 26, 2025; 2:01:01 AM -0500

    V3.1: 5.5 MEDIUM

  • CVE-2022-49245 - In the Linux kernel, the following vulnerability has been resolved: ASoC: rockchip: Fix PM usage reference of rockchip_i2s_tdm_resume pm_runtime_get_sync will increment pm usage counter even it failed. Forgetting to putting operation will result... read CVE-2022-49245
    Published: February 26, 2025; 2:01:01 AM -0500

    V3.1: 5.5 MEDIUM

  • CVE-2022-49244 - In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe The device_node pointer is returned by of_parse_phandle() with refcount incremented. We should use ... read CVE-2022-49244
    Published: February 26, 2025; 2:01:01 AM -0500

    V3.1: 5.5 MEDIUM

  • CVE-2021-47447 - In the Linux kernel, the following vulnerability has been resolved: drm/msm/a3xx: fix error handling in a3xx_gpu_init() These error paths returned 1 on failure, instead of a negative error code. This would lead to an Oops in the caller. A seco... read CVE-2021-47447
    Published: May 22, 2024; 3:15:09 AM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2022-49234 - In the Linux kernel, the following vulnerability has been resolved: net: dsa: Avoid cross-chip syncing of VLAN filtering Changes to VLAN filtering are not applicable to cross-chip notifications. On a system like this: .-----. .-----. .----... read CVE-2022-49234
    Published: February 26, 2025; 2:01:00 AM -0500

    V3.1: 7.1 HIGH

  • CVE-2022-49228 - In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a btf decl_tag bug when tagging a function syzbot reported a btf decl_tag bug with stack trace below: general protection fault, probably for non-canonical address 0x... read CVE-2022-49228
    Published: February 26, 2025; 2:00:59 AM -0500

    V3.1: 5.5 MEDIUM

  • CVE-2022-49222 - In the Linux kernel, the following vulnerability has been resolved: drm/bridge: anx7625: Fix overflow issue on reading EDID The length of EDID block can be longer than 256 bytes, so we should use `int` instead of `u8` for the `edid_pos` variable.
    Published: February 26, 2025; 2:00:59 AM -0500

    V3.1: 5.5 MEDIUM

  • CVE-2021-47448 - In the Linux kernel, the following vulnerability has been resolved: mptcp: fix possible stall on recvmsg() recvmsg() can enter an infinite loop if the caller provides the MSG_WAITALL, the data present in the receive queue is not sufficient to fu... read CVE-2021-47448
    Published: May 22, 2024; 3:15:09 AM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2022-49214 - In the Linux kernel, the following vulnerability has been resolved: powerpc/64s: Don't use DSISR for SLB faults Since commit 46ddcb3950a2 ("powerpc/mm: Show if a bad page fault on data is read or write.") we use page_fault_is_write(regs->dsisr) ... read CVE-2022-49214
    Published: February 26, 2025; 2:00:58 AM -0500

    V3.1: 5.5 MEDIUM

  • CVE-2022-49205 - In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix double uncharge the mem of sk_msg If tcp_bpf_sendmsg is running during a tear down operation, psock may be freed. tcp_bpf_sendmsg() tcp_bpf_send_verdict() ... read CVE-2022-49205
    Published: February 26, 2025; 2:00:57 AM -0500

    V3.1: 7.8 HIGH

  • CVE-2022-49202 - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_uart: add missing NULL check in h5_enqueue Syzbot hit general protection fault in __pm_runtime_resume(). The problem was in missing NULL check. hu->serdev can be... read CVE-2022-49202
    Published: February 26, 2025; 2:00:57 AM -0500

    V3.1: 5.5 MEDIUM

  • CVE-2022-49262 - In the Linux kernel, the following vulnerability has been resolved: crypto: octeontx2 - remove CONFIG_DM_CRYPT check No issues were found while using the driver with dm-crypt enabled. So CONFIG_DM_CRYPT check in the driver can be removed. This ... read CVE-2022-49262
    Published: February 26, 2025; 2:01:03 AM -0500

    V3.1: 5.5 MEDIUM

  • CVE-2022-49261 - In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: add missing boundary check in vm_access A missing bounds check in vm_access() can lead to an out-of-bounds read or write in the adjacent memory area, since the len... read CVE-2022-49261
    Published: February 26, 2025; 2:01:03 AM -0500

    V3.1: 7.8 HIGH

  • CVE-2022-49257 - In the Linux kernel, the following vulnerability has been resolved: watch_queue: Fix NULL dereference in error cleanup In watch_queue_set_size(), the error cleanup code doesn't take account of the fact that __free_page() can't handle a NULL poin... read CVE-2022-49257
    Published: February 26, 2025; 2:01:02 AM -0500

    V3.1: 5.5 MEDIUM

  • CVE-2022-49256 - In the Linux kernel, the following vulnerability has been resolved: watch_queue: Actually free the watch free_watch() does everything barring actually freeing the watch object. Fix this by adding the missing kfree. kmemleak produces a report s... read CVE-2022-49256
    Published: February 26, 2025; 2:01:02 AM -0500

    V3.1: 5.5 MEDIUM

  • CVE-2022-49254 - In the Linux kernel, the following vulnerability has been resolved: media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats() In cal_ctx_v4l2_init_formats(), devm_kzalloc() is assigned to ctx->active_fmt and there is a de... read CVE-2022-49254
    Published: February 26, 2025; 2:01:02 AM -0500

    V3.1: 5.5 MEDIUM

  • CVE-2022-49253 - In the Linux kernel, the following vulnerability has been resolved: media: usb: go7007: s2250-board: fix leak in probe() Call i2c_unregister_device(audio) on this error path.
    Published: February 26, 2025; 2:01:02 AM -0500

    V3.1: 5.5 MEDIUM

  • CVE-2022-49252 - In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type Accessing enums using integer would result in array out of bounds access on platforms like aarch64 where ... read CVE-2022-49252
    Published: February 26, 2025; 2:01:02 AM -0500

    V3.1: 7.1 HIGH

  • CVE-2022-49251 - In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: va-macro: fix accessing array out of bounds for enum type Accessing enums using integer would result in array out of bounds access on platforms like aarch64 where ... read CVE-2022-49251
    Published: February 26, 2025; 2:01:02 AM -0500

    V3.1: 7.1 HIGH

Created September 20, 2022 , Updated August 27, 2024