U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2022-48805

Change History

Initial Analysis by NIST 3/06/2025 7:55:17 AM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
CWE-125
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 from (excluding) 5.4.180
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 from (excluding) 5.10.101
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 from (excluding) 5.15.24
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 3.9 from (excluding) 4.9.303
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.10 from (excluding) 4.14.268
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.15 from (excluding) 4.19.231
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 from (excluding) 5.16.10
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/1668781ed24da43498799aa4f65714a7de201930 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/63f0cfb36c1f1964a59ce544156677601e2d8740 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/711b6bf3fb052f0a6b5b3205d50e30c0c2980382 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/758290defe93a865a2880d10c5d5abd288b64b5d Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/9681823f96a811268265f35307072ad80713c274 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/a0fd5492ee769029a636f1fb521716b022b1423d Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/ffd0393adcdcefab7e131488e10dcfde5e02d6eb Types: Patch