Executive Summary

Informations
Name CVE-2022-49887 First vendor Publication 2025-05-01
Vendor Cve Last vendor Modification 2025-05-07

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

media: meson: vdec: fix possible refcount leak in vdec_probe()

v4l2_device_unregister need to be called to put the refcount got by v4l2_device_register when vdec_probe fails or vdec_remove is called.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49887

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3560

Sources (Detail)

https://git.kernel.org/stable/c/0457e7b12ece1a7e41fa0ae8b7e47c0a72a83bef
https://git.kernel.org/stable/c/70119756311a0be3b95bec2e1ba714673e90feba
https://git.kernel.org/stable/c/7718999356234d9cc6a11b4641bb773928f1390f
https://git.kernel.org/stable/c/be6e22f54623d8a856a4f167b25be73c2ff1ff80
https://git.kernel.org/stable/c/f96ad391d054bd5c36994f98afd6a12cbb5600bf
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2025-06-24 02:15:03
  • Multiple Updates
2025-05-27 13:24:04
  • Multiple Updates
2025-05-27 02:12:46
  • First insertion