The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, product names, and impact metrics.
For information on how to cite the NVD, including the database's Digital Object Identifier (DOI), please consult NIST's Public Data Repository.
Legal Disclaimer:
Here is where you can read the NVD legal disclaimer.
-
CVE-2022-49248 - In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction AV/C deferred transaction was supported at a commit 00a7bb81c20f ("ALSA: firewire-lib: Add support for d... read CVE-2022-49248
Published: February 26, 2025; 2:01:01 AM -0500V3.1: 5.5 MEDIUM
-
CVE-2022-49246 - In the Linux kernel, the following vulnerability has been resolved: ASoC: atmel: Fix error handling in snd_proto_probe The device_node pointer is returned by of_parse_phandle() with refcount incremented. We should use of_node_put() on it when d... read CVE-2022-49246
Published: February 26, 2025; 2:01:01 AM -0500V3.1: 5.5 MEDIUM
-
CVE-2022-49245 - In the Linux kernel, the following vulnerability has been resolved: ASoC: rockchip: Fix PM usage reference of rockchip_i2s_tdm_resume pm_runtime_get_sync will increment pm usage counter even it failed. Forgetting to putting operation will result... read CVE-2022-49245
Published: February 26, 2025; 2:01:01 AM -0500V3.1: 5.5 MEDIUM
-
CVE-2022-49244 - In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe The device_node pointer is returned by of_parse_phandle() with refcount incremented. We should use ... read CVE-2022-49244
Published: February 26, 2025; 2:01:01 AM -0500V3.1: 5.5 MEDIUM
-
CVE-2021-47447 - In the Linux kernel, the following vulnerability has been resolved: drm/msm/a3xx: fix error handling in a3xx_gpu_init() These error paths returned 1 on failure, instead of a negative error code. This would lead to an Oops in the caller. A seco... read CVE-2021-47447
Published: May 22, 2024; 3:15:09 AM -0400V3.1: 5.5 MEDIUM
-
CVE-2022-49234 - In the Linux kernel, the following vulnerability has been resolved: net: dsa: Avoid cross-chip syncing of VLAN filtering Changes to VLAN filtering are not applicable to cross-chip notifications. On a system like this: .-----. .-----. .----... read CVE-2022-49234
Published: February 26, 2025; 2:01:00 AM -0500V3.1: 7.1 HIGH
-
CVE-2022-49228 - In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a btf decl_tag bug when tagging a function syzbot reported a btf decl_tag bug with stack trace below: general protection fault, probably for non-canonical address 0x... read CVE-2022-49228
Published: February 26, 2025; 2:00:59 AM -0500V3.1: 5.5 MEDIUM
-
CVE-2022-49222 - In the Linux kernel, the following vulnerability has been resolved: drm/bridge: anx7625: Fix overflow issue on reading EDID The length of EDID block can be longer than 256 bytes, so we should use `int` instead of `u8` for the `edid_pos` variable.
Published: February 26, 2025; 2:00:59 AM -0500V3.1: 5.5 MEDIUM
-
CVE-2021-47448 - In the Linux kernel, the following vulnerability has been resolved: mptcp: fix possible stall on recvmsg() recvmsg() can enter an infinite loop if the caller provides the MSG_WAITALL, the data present in the receive queue is not sufficient to fu... read CVE-2021-47448
Published: May 22, 2024; 3:15:09 AM -0400V3.1: 5.5 MEDIUM
-
CVE-2022-49214 - In the Linux kernel, the following vulnerability has been resolved: powerpc/64s: Don't use DSISR for SLB faults Since commit 46ddcb3950a2 ("powerpc/mm: Show if a bad page fault on data is read or write.") we use page_fault_is_write(regs->dsisr) ... read CVE-2022-49214
Published: February 26, 2025; 2:00:58 AM -0500V3.1: 5.5 MEDIUM
-
CVE-2022-49205 - In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix double uncharge the mem of sk_msg If tcp_bpf_sendmsg is running during a tear down operation, psock may be freed. tcp_bpf_sendmsg() tcp_bpf_send_verdict() ... read CVE-2022-49205
Published: February 26, 2025; 2:00:57 AM -0500V3.1: 7.8 HIGH
-
CVE-2022-49202 - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_uart: add missing NULL check in h5_enqueue Syzbot hit general protection fault in __pm_runtime_resume(). The problem was in missing NULL check. hu->serdev can be... read CVE-2022-49202
Published: February 26, 2025; 2:00:57 AM -0500V3.1: 5.5 MEDIUM
-
CVE-2022-49262 - In the Linux kernel, the following vulnerability has been resolved: crypto: octeontx2 - remove CONFIG_DM_CRYPT check No issues were found while using the driver with dm-crypt enabled. So CONFIG_DM_CRYPT check in the driver can be removed. This ... read CVE-2022-49262
Published: February 26, 2025; 2:01:03 AM -0500V3.1: 5.5 MEDIUM
-
CVE-2022-49261 - In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: add missing boundary check in vm_access A missing bounds check in vm_access() can lead to an out-of-bounds read or write in the adjacent memory area, since the len... read CVE-2022-49261
Published: February 26, 2025; 2:01:03 AM -0500V3.1: 7.8 HIGH
-
CVE-2022-49257 - In the Linux kernel, the following vulnerability has been resolved: watch_queue: Fix NULL dereference in error cleanup In watch_queue_set_size(), the error cleanup code doesn't take account of the fact that __free_page() can't handle a NULL poin... read CVE-2022-49257
Published: February 26, 2025; 2:01:02 AM -0500V3.1: 5.5 MEDIUM
-
CVE-2022-49256 - In the Linux kernel, the following vulnerability has been resolved: watch_queue: Actually free the watch free_watch() does everything barring actually freeing the watch object. Fix this by adding the missing kfree. kmemleak produces a report s... read CVE-2022-49256
Published: February 26, 2025; 2:01:02 AM -0500V3.1: 5.5 MEDIUM
-
CVE-2022-49254 - In the Linux kernel, the following vulnerability has been resolved: media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats() In cal_ctx_v4l2_init_formats(), devm_kzalloc() is assigned to ctx->active_fmt and there is a de... read CVE-2022-49254
Published: February 26, 2025; 2:01:02 AM -0500V3.1: 5.5 MEDIUM
-
CVE-2022-49253 - In the Linux kernel, the following vulnerability has been resolved: media: usb: go7007: s2250-board: fix leak in probe() Call i2c_unregister_device(audio) on this error path.
Published: February 26, 2025; 2:01:02 AM -0500V3.1: 5.5 MEDIUM
-
CVE-2022-49252 - In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type Accessing enums using integer would result in array out of bounds access on platforms like aarch64 where ... read CVE-2022-49252
Published: February 26, 2025; 2:01:02 AM -0500V3.1: 7.1 HIGH
-
CVE-2022-49251 - In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: va-macro: fix accessing array out of bounds for enum type Accessing enums using integer would result in array out of bounds access on platforms like aarch64 where ... read CVE-2022-49251
Published: February 26, 2025; 2:01:02 AM -0500V3.1: 7.1 HIGH