{"vulnerability": "CVE-2022-4899", "sightings": [{"uuid": "bb4730f9-3f65-48ad-ac49-d6b0395ff683", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2022-4899", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "a3caa493-00b9-4789-907f-7235c9bde846", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2022-48990", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "24d84580-2d03-4dfd-9f1f-5d8b541c4a7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2022-48998", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "e72bad00-9988-455d-9be7-bfacfa8b8994", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-48990", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16472", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-48990\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix use-after-free during gpu recovery\n\n[Why]\n    [  754.862560] refcount_t: underflow; use-after-free.\n    [  754.862898] Call Trace:\n    [  754.862903]  \n    [  754.862913]  amdgpu_job_free_cb+0xc2/0xe1 [amdgpu]\n    [  754.863543]  drm_sched_main.cold+0x34/0x39 [amd_sched]\n\n[How]\n    The fw_fence may be not init, check whether dma_fence_init\n    is performed before job free\n\ud83d\udccf Published: 2024-10-21T20:06:07.203Z\n\ud83d\udccf Modified: 2025-05-15T12:28:20.772Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/d2a89cd942edd50c1e652004fd64019be78b0a96\n2. https://git.kernel.org/stable/c/3cb93f390453cde4d6afda1587aaa00e75e09617", "creation_timestamp": "2025-05-15T12:34:18.000000Z"}, {"uuid": "a575ae80-b6a4-4cd8-a946-101c25f9b9a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4899", "type": "seen", "source": "Telegram/IwprIIHeVcR1FI9OxEZ0Urew_PnnER8mJhAAK-cVF-pRvkRX", "content": "", "creation_timestamp": "2025-02-18T21:11:32.000000Z"}, {"uuid": "a76d7172-de4e-42cd-866f-b112ef2fa522", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4899", "type": "seen", "source": "https://t.me/cibsecurity/61286", "content": "\u203c CVE-2022-4899 \u203c\n\nA vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-01T00:22:24.000000Z"}]}