| CVE-2022-23498 |
A flaw was found in the Grafana package. When data-source query caching is enabled, Grafana caches all headers, including `grafana_session.` As a result, any user that queries a data source where the caching is enabled can acquire another user?s session. |
Important |
grafana |
否 |
完成修复 |
2023-02-03 |
2026-01-04 |
| CVE-2023-25012 |
The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long. |
Moderate |
kernel 4.19, kernel(ANCK)5.10 |
否 |
完成修复 |
2023-02-02 |
2025-12-30 |
| CVE-2023-0615 |
A memory leak flaw and potential divide by zero and Integer overflow was found in the Linux kernel V4L2 and vivid test code functionality. This issue occurs when a user triggers ioctls, such as VIDIOC_S_DV_TIMINGS ioctl. This could allow a local user to crash the system if vivid test code enabled. |
Moderate |
kernel |
是 |
完成修复 |
2023-02-02 |
2026-01-22 |
| CVE-2023-0597 |
A memory leak flaw has been found in the Linux Kernel. |
Moderate |
kernel |
否 |
完成修复 |
2023-02-01 |
2026-01-04 |
| CVE-2023-0590 |
A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. |
Moderate |
kernel |
否 |
完成修复 |
2023-02-01 |
2026-01-04 |
| CVE-2022-46344 |
A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIChangeProperty request has a length-validation issues, resulting in out-of-bounds memory reads and potential information disclosure. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. |
Important |
xorg-x11-server-Xwayland, xorg-x11-server, tigervnc |
否 |
完成修复 |
2023-01-31 |
2026-01-04 |
| CVE-2022-46343 |
A vulnerability was found in X.Org. This security flaw occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. |
Important |
xorg-x11-server-Xwayland, xorg-x11-server, tigervnc |
否 |
完成修复 |
2023-01-31 |
2026-01-04 |
| CVE-2022-46342 |
A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se |
Important |
xorg-x11-server-Xwayland, xorg-x11-server, tigervnc |
否 |
完成修复 |
2023-01-31 |
2026-01-04 |
| CVE-2022-46341 |
A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIPassiveUngrab request accesses out-of-bounds memory when invoked with a high keycode or button code. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. |
Important |
xorg-x11-server-Xwayland, xorg-x11-server, tigervnc |
否 |
完成修复 |
2023-01-31 |
2026-01-04 |
| CVE-2022-46340 |
A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order. |
Important |
xorg-x11-server-Xwayland, xorg-x11-server, tigervnc |
否 |
完成修复 |
2023-01-31 |
2026-01-04 |
| CVE-2022-4283 |
A vulnerability was found in X.Org. This security flaw occurs because the XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. |
Important |
xorg-x11-server-Xwayland, xorg-x11-server, tigervnc |
否 |
完成修复 |
2023-01-31 |
2026-01-04 |
| CVE-2022-25881 |
A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server. |
Moderate |
nodejs:16, cockpit-appstream, nodejs:18, dotnet6.0, nodejs:14, nodejs:20, nodejs-packaging, cockpit, nodejs, container-tools:an8, cockpit-session-recording |
否 |
完成修复 |
2023-01-31 |
2025-12-05 |
| CVE-2023-0240 |
There is a logic error in io_uring's implementation which can be used to trigger a use-after-free vulnerability leading to privilege escalation. In the io_prep_async_work function the assumption that the last io_grab_identity call cannot return false is not true, and in this case the function will use the init_cred or the previous linked requests identity to do operations instead of using the current identity. This can lead to reference counting issues causing use-after-free. We recommend upgrading past version 5.10.161. |
Moderate |
kernel |
否 |
完成修复 |
2023-01-30 |
2025-12-30 |
| CVE-2023-0417 |
A flaw was found in the NFS dissector of Wireshark. This issue occurs when decoding malformed packets from a pcap file or from the network, causing excessive consumption of resources, resulting in a Denial of Service. |
Moderate |
wireshark |
否 |
完成修复 |
2023-01-27 |
2026-01-25 |
| CVE-2023-0416 |
A flaw was found in the GNW dissector of Wireshark. This issue occurs when decoding malformed packets from a pcap file or from the network, causing a use-after-free problem, resulting in a Denial of Service. |
Moderate |
wireshark |
否 |
完成修复 |
2023-01-27 |
2026-01-25 |
| CVE-2023-0415 |
A flaw was found in the iSCSI dissector of Wireshark. This issue occurs when decoding malformed packets from a pcap file or from the network, causing a NULL pointer dereference, resulting in a Denial of Service. |
Moderate |
wireshark |
否 |
完成修复 |
2023-01-27 |
2026-01-25 |
| CVE-2023-0414 |
A flaw was found in the EAP dissector of Wireshark. This issue occurs when decoding malformed packets from a pcap file or from the network, causing an use-after-free problem, resulting in a Denial of Service. |
Moderate |
wireshark |
否 |
完成修复 |
2023-01-27 |
2026-01-25 |
| CVE-2023-0413 |
A flaw was found in the conversation tracking module of Wireshark. This issue occurs when decoding malformed packets from a pcap file or from the network, causing a crash and resulting in a Denial of Service. |
Moderate |
wireshark |
否 |
完成修复 |
2023-01-27 |
2026-01-25 |
| CVE-2023-0412 |
A flaw was found in the TIPC dissector of Wireshark. This issue occurs when decoding malformed packets from a pcap file or from the network, causing an out-of-bounds read, resulting in a Denial of Service. |
Moderate |
wireshark |
否 |
完成修复 |
2023-01-27 |
2026-01-25 |
| CVE-2023-0411 |
A flaw was found in the BPv6, NCP, and RTPS dissectors of Wireshark. This issue occurs when decoding malformed packets from a pcap file or from the network, causing excessive consumption of CPU resources due to excessive loops, resulting in a Denial of Service. |
Moderate |
wireshark |
否 |
完成修复 |
2023-01-27 |
2026-01-25 |
| CVE-2023-0394 |
A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash. |
Moderate |
kernel |
否 |
完成修复 |
2023-01-27 |
2025-12-30 |
| CVE-2022-2712 |
In Eclipse GlassFish versions 5.1.0 to 6.2.5, there is a vulnerability in relative path traversal because it does not filter request path starting with './'. Successful exploitation could allow an remote unauthenticated attacker to access critical data, such as configuration files and deployed application source code. |
Important |
glassfish-master-pom |
否 |
完成修复 |
2023-01-27 |
2026-01-05 |
| CVE-2022-23552 |
A flaw was found in The GeoMap and Canvas plugins of Grafana. The GeoMap and Canvas plugins are core plugins in Grafana, which means that all Grafana instances have GeoMap and Canvas installed. These two plugins are vulnerable to Cross-site scripting, where an attacker with an Editor role can add an SVG file containing malicious JavaScript code. The Javascript is executed when a user with an admin role later edits the GeoMap/Canvas panel. |
Important |
grafana |
否 |
完成修复 |
2023-01-27 |
2026-01-04 |
| CVE-2023-20928 |
In binder_vma_close of binder.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-254837884References: Upstream kernel |
Important |
kernel |
否 |
完成修复 |
2023-01-26 |
2025-12-04 |
| CVE-2018-25078 |
man-db before 2.8.5 on Gentoo allows local users (with access to the man user account) to gain root privileges because /usr/bin/mandb is executed by root but not owned by root. (Also, the owner can strip the setuid and setgid bits.) |
Important |
man-db |
否 |
完成修复 |
2023-01-26 |
2026-01-08 |
| CVE-2023-23605 |
The Mozilla Foundation Security Advisory describes this flaw as: |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-01-25 |
2026-01-04 |
| CVE-2023-23603 |
The Mozilla Foundation Security Advisory describes this flaw as: |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-01-25 |
2026-01-24 |
| CVE-2023-23602 |
The Mozilla Foundation Security Advisory describes this flaw as: |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-01-25 |
2026-01-24 |
| CVE-2023-23601 |
The Mozilla Foundation Security Advisory describes this flaw as: |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-01-25 |
2026-01-24 |
| CVE-2023-23599 |
The Mozilla Foundation Security Advisory describes this flaw as: |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-01-25 |
2026-01-24 |
| CVE-2023-23598 |
Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to `DataTransfer.setData`. This vulnerability affects Firefox < 109, Firefox ESR < 102.7, and Thunderbird < 102.7. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-01-25 |
2026-01-04 |
| CVE-2023-22809 |
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value. |
Important |
sudo |
否 |
完成修复 |
2023-01-25 |
2026-01-08 |
| CVE-2022-46877 |
By confusing the browser, the fullscreen notification could have been delayed or suppressed, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox < 108. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-01-25 |
2026-01-24 |
| CVE-2022-46871 |
An out of date library (libusrsctp) contained vulnerabilities that could potentially be exploited. This vulnerability affects Firefox < 108. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-01-25 |
2026-01-04 |
| CVE-2022-4254 |
A vulnerability was found in SSSD, in the libsss_certmap functionality. PKINIT enables a client to authenticate to the KDC using an X.509 certificate and the corresponding private key, rather than a passphrase or keytab. FreeIPA uses mapping rules to map a certificate presented during a PKINIT authentication request to the corresponding principal. The mapping filter is vulnerable to LDAP filter injection. The search result can be influenced by values in the certificate, which may be attacker controlled. In the most extreme case, an attacker could gain control of the admin account, leading to full domain takeover. |
Important |
sssd |
否 |
完成修复 |
2023-01-24 |
2026-01-09 |
| CVE-2023-24039 |
A flaw was found in libXm, a library distributed by the motif package. A specially crafted XPM file with long color strings can lead to a stack-based buffer overflow in the ParseColors function due to the unsafe use of the strcat function, resulting in privilege escalation. |
Important |
motif |
否 |
完成修复 |
2023-01-21 |
2026-01-07 |
| CVE-2023-22742 |
A flaw was found in libgit2, a cross-platform, linkable library implementation of Git. When using an SSH remote with the optional libssh2 backend, libgit2 does not perform certificate checking by default. Prior versions of libgit2 require the caller to set the `certificate_check` field of libgit2's `git_remote_callbacks` structure. If a certificate check callback is not set, libgit2 does not perform any certificate checking. This means that by default, without configuring a certificate check callback, clients will not perform validation on the server SSH keys and may be subject to a Man-in-the-middle attack. |
Moderate |
libgit2, rust |
否 |
完成修复 |
2023-01-21 |
2025-12-16 |
| CVE-2021-33641 |
When processing files, malloc stores the data of the current line. When processing comments, malloc incorrectly accesses the released memory (use after free). |
Important |
byacc |
否 |
完成修复 |
2023-01-20 |
2026-01-05 |
| CVE-2022-47929 |
In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class" commands. This affects qdisc_graft in net/sched/sch_api.c. |
Moderate |
kernel |
否 |
完成修复 |
2023-01-18 |
2025-12-30 |
| CVE-2022-41903 |
Git is distributed revision control system. `git log` can display commits in an arbitrary format using its `--format` specifiers. This functionality is also exposed to `git archive` via the `export-subst` gitattribute. When processing the padding operators, there is a integer overflow in `pretty.c::format_and_pad_commit()` where a `size_t` is stored improperly as an `int`, and then added as an offset to a `memcpy()`. This overflow can be triggered directly by a user running a command which invokes the commit formatting machinery (e.g., `git log --format=...`). It may also be triggered indirectly through git archive via the export-subst mechanism, which expands format specifiers inside of files within the repository during a git archive. This integer overflow can result in arbitrary heap writes, which may result in arbitrary code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. Users who are unable to upgrade should disable `git archive` in untrusted repositories. If you expose git archive via `git daemon`, disable it by running `git config --global daemon.uploadArch false`. |
Important |
git |
否 |
完成修复 |
2023-01-18 |
2026-01-06 |
| CVE-2022-23521 |
Git is distributed revision control system. gitattributes are a mechanism to allow defining attributes for paths. These attributes can be defined by adding a `.gitattributes` file to the repository, which contains a set of file patterns and the attributes that should be set for paths matching this pattern. When parsing gitattributes, multiple integer overflows can occur when there is a huge number of path patterns, a huge number of attributes for a single pattern, or when the declared attribute names are huge. These overflows can be triggered via a crafted `.gitattributes` file that may be part of the commit history. Git silently splits lines longer than 2KB when parsing gitattributes from a file, but not when parsing them from the index. Consequentially, the failure mode depends on whether the file exists in the working tree, the index or both. This integer overflow can result in arbitrary heap reads and writes, which may result in remote code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. There are no known workarounds for this issue. |
Important |
git |
否 |
完成修复 |
2023-01-18 |
2026-01-06 |
| CVE-2006-20001 |
A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier. |
Important |
httpd:2.4, httpd |
否 |
完成修复 |
2023-01-18 |
2026-01-09 |
| CVE-2023-0122 |
A NULL pointer dereference vulnerability in the Linux kernel NVMe functionality, in nvmet_setup_auth(), allows an attacker to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine. Affected versions v6.0-rc1 to v6.0-rc3, fixed in v6.0-rc4. |
Moderate |
kernel |
否 |
完成修复 |
2023-01-17 |
2025-12-30 |
| CVE-2022-4883 |
A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable. |
Important |
libXpm |
否 |
完成修复 |
2023-01-17 |
2026-01-05 |
| CVE-2022-40304 |
An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked. |
Important |
libxml2 |
否 |
完成修复 |
2023-01-17 |
2026-01-09 |
| CVE-2022-40303 |
An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault. |
Important |
libxml2 |
否 |
完成修复 |
2023-01-17 |
2026-01-09 |
| CVE-2022-3650 |
A privilege escalation flaw was found in Ceph. Ceph-crash.service allows a local attacker to escalate privileges to root in the form of a crash dump, and dump privileged information. |
Important |
ceph |
否 |
完成修复 |
2023-01-17 |
2026-01-04 |
| CVE-2023-0330 |
A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like stack overflow or use-after-free. |
Moderate |
qemu-kvm-ma, virt:an, qemu-kvm |
否 |
完成修复 |
2023-01-16 |
2025-12-19 |
| CVE-2023-0179 |
A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution. |
Important |
kernel, kernel(ANCK)5.10 |
是 |
完成修复 |
2023-01-16 |
2025-12-04 |
| CVE-2023-23559 |
In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition. |
Moderate |
kernel |
否 |
完成修复 |
2023-01-13 |
2025-12-30 |
| CVE-2023-0266 |
A use-after-free flaw was found in the ALSA subsystem in sound/core/control.c in the Linux kernel. This flaw allows a local attacker to cause a use-after-free issue. |
Important |
kernel |
是 |
完成修复 |
2023-01-13 |
2025-12-04 |
| CVE-2022-4139 |
An incorrect TLB flush issue was found in the Linux kernel?s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system. |
Important |
kernel |
否 |
完成修复 |
2023-01-13 |
2025-12-04 |
| CVE-2022-2964 |
A flaw was found in the Linux kernel?s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes. |
Important |
kernel |
是 |
完成修复 |
2023-01-13 |
2025-12-04 |
| CVE-2023-23455 |
atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results). |
Moderate |
kernel |
否 |
完成修复 |
2023-01-12 |
2025-12-30 |
| CVE-2023-23454 |
cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results). |
Moderate |
kernel |
否 |
完成修复 |
2023-01-12 |
2025-12-30 |
| CVE-2022-4743 |
A potential memory leak issue was discovered in SDL2 in GLES_CreateTexture() function in SDL_render_gles.c. The vulnerability allows an attacker to cause a denial of service attack. The vulnerability affects SDL2 v2.0.4 and above. SDL-1.x are not affected. |
Important |
SDL2 |
否 |
完成修复 |
2023-01-12 |
2026-01-04 |
| CVE-2022-43591 |
A buffer overflow vulnerability exists in the QML QtScript Reflect API of Qt Project Qt 6.3.2. A specially-crafted javascript code can trigger an out-of-bounds memory access, which can lead to arbitrary code execution. Target application would need to access a malicious web page to trigger this vulnerability. |
Important |
qt5-qtdeclarative |
否 |
完成修复 |
2023-01-12 |
2026-01-04 |
| CVE-2022-4345 |
Infinite loops in the BPv6, OpenFlow, and Kafka protocol dissectors in Wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via packet injection or crafted capture file |
Moderate |
wireshark |
否 |
完成修复 |
2023-01-12 |
2026-01-25 |
| CVE-2022-4344 |
Memory exhaustion in the Kafka protocol dissector in Wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via packet injection or crafted capture file |
Moderate |
wireshark |
否 |
完成修复 |
2023-01-12 |
2026-01-25 |
| CVE-2022-40983 |
An integer overflow vulnerability exists in the QML QtScript Reflect API of Qt Project Qt 6.3.2. A specially-crafted javascript code can trigger an integer overflow during memory allocation, which can lead to arbitrary code execution. Target application would need to access a malicious web page to trigger this vulnerability. |
Important |
qt5-qtdeclarative |
否 |
完成修复 |
2023-01-12 |
2026-01-04 |
| CVE-2022-3977 |
A use-after-free flaw was found in the Linux kernel MCTP (Management Component Transport Protocol) functionality. This issue occurs when a user simultaneously calls DROPTAG ioctl and socket close happens, which could allow a local user to crash the system or potentially escalate their privileges on the system. |
Moderate |
kernel |
否 |
完成修复 |
2023-01-12 |
2025-12-30 |
| CVE-2023-1579 |
No description is available for this CVE. |
Moderate |
binutils |
否 |
完成修复 |
2023-01-11 |
2025-12-11 |
| CVE-2022-4696 |
There exists a use-after-free vulnerability in the Linux kernel through io_uring and the IORING_OP_SPLICE operation. If IORING_OP_SPLICE is missing the IO_WQ_WORK_FILES flag, which signals that the operation won't use current->nsproxy, so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current->nsproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above |
Important |
kernel:4.19, kernel(ANCK)5.10, kernel, kernel:6.6, kernel:5.10 |
是 |
完成修复 |
2023-01-11 |
2025-12-04 |
| CVE-2023-22895 |
The bzip2 crate before 0.4.4 for Rust allow attackers to cause a denial of service via a large file that triggers an integer overflow in mem.rs. NOTE: this is unrelated to the https://crates.io/crates/bzip2-rs product. |
Important |
bzip2 |
否 |
完成修复 |
2023-01-10 |
2026-01-07 |
| CVE-2023-21538 |
A vulnerability was found in dotnet. This flaw occurs when parsing an empty HTTP response as a JSON.NET JObject that causes a stack overflow and crashes a process. |
Moderate |
dotnet7.0, dotnet6.0 |
否 |
完成修复 |
2023-01-10 |
2025-12-05 |
| CVE-2023-0210 |
A bug affects the Linux kernel?s ksmbd NTLMv2 authentication and is known to crash the OS immediately in Linux-based systems. |
Important |
kernel |
是 |
完成修复 |
2023-01-10 |
2025-12-04 |
| CVE-2022-46176 |
Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url..insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible. |
Moderate |
rust, rust-toolset |
否 |
完成修复 |
2023-01-10 |
2025-12-16 |
| CVE-2022-4378 |
A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. |
Important |
kernel |
是 |
完成修复 |
2023-01-10 |
2025-12-04 |
| CVE-2022-43750 |
drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor's internal memory. |
Moderate |
kernel |
否 |
完成修复 |
2023-01-10 |
2025-12-30 |
| CVE-2022-42896 |
There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url |
Moderate |
kernel |
否 |
完成修复 |
2023-01-10 |
2025-12-30 |
| CVE-2022-42895 |
There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url |
Moderate |
kernel |
否 |
完成修复 |
2023-01-10 |
2025-12-30 |
| CVE-2022-42722 |
In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices. |
Moderate |
kernel, kernel(RHCK)4.18, kernel(ANCK)5.10 |
否 |
完成修复 |
2023-01-10 |
2025-12-30 |
| CVE-2022-42721 |
A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code. |
Moderate |
kernel, kernel(RHCK)4.18, kernel(ANCK)5.10 |
否 |
完成修复 |
2023-01-10 |
2025-12-30 |
| CVE-2022-42720 |
Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code. |
Important |
kernel:4.19, kernel(RHCK)4.18, kernel(ANCK)5.10, kernel:4.18, kernel, kernel:6.6, kernel:5.10 |
是 |
完成修复 |
2023-01-10 |
2025-12-04 |
| CVE-2022-42719 |
A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code. |
Important |
kernel(ANCK)5.10, kernel |
是 |
完成修复 |
2023-01-10 |
2025-12-04 |
| CVE-2022-41674 |
An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c. |
Important |
kernel:4.19, kernel(RHCK)4.18, kernel(ANCK)5.10, kernel:4.18, kernel, kernel:6.6, kernel:5.10 |
是 |
完成修复 |
2023-01-10 |
2025-12-04 |
| CVE-2022-40768 |
drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case. |
Moderate |
kernel, kernel(ANCK)5.10 |
否 |
完成修复 |
2023-01-10 |
2025-12-30 |
| CVE-2022-39842 |
** DISPUTED ** An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur. NOTE: the original discoverer disputes that the overflow can actually happen. |
Moderate |
kernel |
否 |
完成修复 |
2023-01-10 |
2025-12-30 |
| CVE-2022-39190 |
An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain. |
Moderate |
kernel, kernel(ANCK)5.10 |
否 |
完成修复 |
2023-01-10 |
2025-12-30 |
| CVE-2022-39189 |
An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations. |
Important |
kernel:4.19, kernel:4.18, kernel, kernel:6.6, kernel:5.10 |
是 |
完成修复 |
2023-01-10 |
2025-12-04 |
| CVE-2022-3649 |
A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992. |
Low |
kernel, kernel(ANCK)5.10 |
是 |
完成修复 |
2023-01-10 |
2026-01-22 |
| CVE-2022-3646 |
A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability. |
Low |
kernel(ANCK)5.10, kernel |
是 |
完成修复 |
2023-01-10 |
2026-01-22 |
| CVE-2022-3635 |
A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability. |
Important |
kernel:5.10, kernel:4.19, kernel, kernel:6.6 |
是 |
完成修复 |
2023-01-10 |
2025-12-09 |
| CVE-2022-3633 |
A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932. |
Low |
kernel(ANCK)5.10, kernel |
是 |
完成修复 |
2023-01-10 |
2026-01-22 |
| CVE-2022-3629 |
A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability. |
Low |
kernel |
是 |
完成修复 |
2023-01-10 |
2026-01-22 |
| CVE-2022-3628 |
A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges. |
Moderate |
kernel |
否 |
完成修复 |
2023-01-10 |
2025-12-30 |
| CVE-2022-3625 |
A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability. |
Moderate |
kernel, kernel(RHCK)4.18, kernel(ANCK)5.10 |
否 |
完成修复 |
2023-01-10 |
2025-12-30 |
| CVE-2022-3623 |
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function follow_page_pte of the file mm/gup.c of the component BPF. The manipulation leads to race condition. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211921 was assigned to this vulnerability. |
Important |
kernel:4.19, kernel(RHCK)4.18, kernel(ANCK)5.10, kernel:4.18, kernel, kernel:6.6, kernel:5.10, kernel 4.19 |
是 |
完成修复 |
2023-01-10 |
2025-12-09 |
| CVE-2022-3621 |
A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920. |
Moderate |
kernel, kernel(ANCK)5.10 |
否 |
完成修复 |
2023-01-10 |
2025-12-30 |
| CVE-2022-3594 |
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363. |
Moderate |
kernel |
否 |
完成修复 |
2023-01-10 |
2025-12-30 |
| CVE-2022-3586 |
A flaw was found in the Linux kernel?s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service. |
Moderate |
kernel |
否 |
完成修复 |
2023-01-10 |
2025-12-30 |
| CVE-2022-3567 |
A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability. |
Moderate |
kernel(ANCK)5.10, kernel(RHCK)4.18, kernel |
否 |
完成修复 |
2023-01-10 |
2025-12-30 |
| CVE-2022-3566 |
A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. The identifier VDB-211089 was assigned to this vulnerability. |
Moderate |
kernel |
否 |
完成修复 |
2023-01-10 |
2025-12-30 |
| CVE-2022-3565 |
A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088. |
Important |
kernel:4.19, kernel:4.18, kernel, kernel:6.6, kernel:5.10 |
是 |
完成修复 |
2023-01-10 |
2025-12-09 |
| CVE-2022-3564 |
A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087. |
Important |
kernel |
是 |
完成修复 |
2023-01-10 |
2025-12-09 |
| CVE-2022-3545 |
A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability. |
Important |
kernel:4.19, kernel:4.18, kernel, kernel:6.6, kernel:5.10 |
是 |
完成修复 |
2023-01-10 |
2025-12-09 |
| CVE-2022-3534 |
A vulnerability classified as critical has been found in Linux Kernel. Affected is the function btf_dump_name_dups of the file tools/lib/bpf/btf_dump.c of the component libbpf. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211032. |
Important |
kernel:4.19, kernel(ANCK)5.10, kernel, kernel:6.6, kernel:5.10 |
是 |
完成修复 |
2023-01-10 |
2025-12-09 |
| CVE-2022-3524 |
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability. |
Moderate |
kernel |
否 |
完成修复 |
2023-01-10 |
2025-12-30 |
| CVE-2022-3521 |
A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability. |
Important |
kernel:5.10, kernel:4.19, kernel, kernel:6.6 |
是 |
完成修复 |
2023-01-10 |
2025-12-09 |
| CVE-2022-3435 |
A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability. |
Moderate |
kernel4.19.91-26, kernel, kernel(ANCK)5.10 |
否 |
完成修复 |
2023-01-10 |
2025-12-30 |