| CVE-2022-41858 |
A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information. |
Moderate |
kernel |
否 |
完成修复 |
2022-11-29 |
2025-12-30 |
| CVE-2022-4172 |
An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest could use these flaws to crash the QEMU process on the host. |
Moderate |
qemu, qemu-kvm |
否 |
完成修复 |
2022-11-29 |
2025-12-18 |
| CVE-2022-4129 |
A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service. |
Moderate |
kernel |
否 |
完成修复 |
2022-11-29 |
2025-12-30 |
| CVE-2022-30123 |
A flaw was found in ruby gem-rack. This flaw allows a malicious actor to craft requests that can cause shell escape sequences to be written to the terminal via rack's `Lint` middleware and `CommonLogger` middleware. This issue can leverage these escape sequences to execute commands in the victim's terminal. |
Important |
pcs |
否 |
完成修复 |
2022-11-29 |
2026-01-05 |
| CVE-2022-4128 |
A NULL pointer dereference issue was discovered in the Linux kernel in the MPTCP protocol when traversing the subflow list at disconnect time. A local user could use this flaw to potentially crash the system causing a denial of service. |
Moderate |
kernel 5.10, kernel 4.19 |
是 |
完成修复 |
2022-11-28 |
2025-12-09 |
| CVE-2022-4127 |
A NULL pointer dereference issue was discovered in the Linux kernel in io_files_update_with_index_alloc. A local user could use this flaw to potentially crash the system causing a denial of service. |
Moderate |
kernel 5.10, kernel 4.19 |
否 |
完成修复 |
2022-11-28 |
2025-12-30 |
| CVE-2022-38900 |
A flaw was found in decode-uri-component. This issue occurs due to a specially crafted input, resulting in a denial of service. |
Important |
cockpit, pcs, 389-ds:1.4, container-tools:an8, nodejs:14, cockpit-appstream, nodejs-nodemon, grafana |
否 |
完成修复 |
2022-11-28 |
2026-01-04 |
| CVE-2022-45934 |
An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets. |
Moderate |
kernel |
否 |
完成修复 |
2022-11-27 |
2025-12-30 |
| CVE-2022-45888 |
An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device. |
Moderate |
kernel |
否 |
完成修复 |
2022-11-25 |
2025-12-30 |
| CVE-2022-4144 |
An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest's physical address, potentially reading past the end of the bar space into adjacent pages. This could allow a malicious guest user to crash the QEMU process on the host, causing a denial of service. Spice was found to be affected by the same CVE. |
Moderate |
spice, qemu-kvm-ma, qemu-kvm |
否 |
完成修复 |
2022-11-25 |
2025-12-18 |
| CVE-2018-5740 |
"deny-answer-aliases" is a little-used feature intended to help recursive server operators protect end users against DNS rebinding attacks, a potential method of circumventing the security model used by client browsers. However, a defect in this feature makes it easy, when the feature is in use, to experience an assertion failure in name.c. Affects BIND 9.7.0->9.8.8, 9.9.0->9.9.13, 9.10.0->9.10.8, 9.11.0->9.11.4, 9.12.0->9.12.2, 9.13.0->9.13.2. |
Important |
bind |
否 |
完成修复 |
2022-11-25 |
2026-01-06 |
| CVE-2017-15906 |
The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files. |
Moderate |
openssh |
否 |
完成修复 |
2022-11-25 |
2026-01-25 |
| CVE-2022-45886 |
从6.0.9开始,Linux内核中发现了一个问题。drivers/media/dvb-core/dvb_net.c具有.disconnect与dvb_device_open竞争条件,导致释放后使用。 |
Low |
kernel:4.19, kernel:4.18, kernel, kernel:6.6, kernel:5.10 |
否 |
完成修复 |
2022-11-24 |
2026-01-20 |
| CVE-2022-45885 |
从6.0.9开始,Linux内核中发现了一个问题。drivers/media/dvb-core/dvb_frontend.c存在竞争条件,当设备断开连接时可能会导致释放后使用。 |
Low |
kernel |
否 |
完成修复 |
2022-11-24 |
2026-01-20 |
| CVE-2022-45884 |
从6.0.9开始,Linux内核中发现了一个问题。drivers/media/dvb-core/dvbdev.c有一个use-after-free,与dvb_register_device动态分配fops相关。 |
Low |
kernel |
否 |
完成修复 |
2022-11-24 |
2026-01-20 |
| CVE-2023-0469 |
A use-after-free flaw was found in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent in the Linux Kernel during call cleanup. This flaw may lead to a denial of service. |
Low |
kernel |
是 |
完成修复 |
2022-11-23 |
2026-01-22 |
| CVE-2022-45869 |
A flaw was found in the Linux kernel in the KVM. A race condition in direct_page_fault allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualization and the TDP MMU are enabled. |
Moderate |
kernel:5.10, kernel:4.19, kernel, kernel:6.6 |
否 |
完成修复 |
2022-11-23 |
2025-12-18 |
| CVE-2022-45421 |
Mozilla developers Andrew McCreight and Gabriele Svelto reported memory safety bugs present in Thunderbird 102.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2022-11-23 |
2025-12-30 |
| CVE-2022-45420 |
Use tables inside of an iframe, an attacker could have caused iframe contents to be rendered outside the boundaries of the iframe, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2022-11-23 |
2026-01-24 |
| CVE-2022-45418 |
If a custom mouse cursor is specified in CSS, under certain circumstances the cursor could have been drawn over the browser UI, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2022-11-23 |
2026-01-24 |
| CVE-2022-45416 |
Keyboard events reference strings like "KeyA" that were at fixed, known, and widely-spread addresses. Cache-based timing attacks such as Prime+Probe could have possibly figured out which keys were being pressed. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2022-11-23 |
2026-01-24 |
| CVE-2022-45412 |
When resolving a symlink such as file:///proc/self/fd/1, an error message may be produced where the symlink was resolved to a string containing unitialized memory in the buffer. *This bug only affects Thunderbird on Unix-based operated systems (Android, Linux, MacOS). Windows is unaffected.*. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2022-11-23 |
2026-01-04 |
| CVE-2022-45411 |
Cross-Site Tracing occurs when a server will echo a request back via the Trace method, allowing an XSS attack to access to authorization headers and cookies inaccessible to JavaScript (such as cookies protected by HTTPOnly). To mitigate this attack, browsers placed limits on fetch() and XMLHttpRequest; however some webservers have implemented non-standard headers such as X-Http-Method-Override that override the HTTP method, and made this attack possible again. Thunderbird has applied the same mitigations to the use of this and similar headers. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2022-11-23 |
2026-01-24 |
| CVE-2022-45410 |
When a ServiceWorker intercepted a request with FetchEvent, the origin of the request was lost after the ServiceWorker took ownership of it. This had the effect of negating SameSite cookie protections. This was addressed in the spec and then in browsers. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2022-11-23 |
2026-01-24 |
| CVE-2022-45409 |
The garbage collector could have been aborted in several states and zones and GCRuntime::finishCollection may not have been called, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2022-11-23 |
2026-01-04 |
| CVE-2022-45408 |
Through a series of popups that reuse windowName, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2022-11-23 |
2026-01-04 |
| CVE-2022-45406 |
If an out-of-memory condition occurred when creating a JavaScript global, a JavaScript realm may be deleted while references to it lived on in a BaseShape. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2022-11-23 |
2026-01-04 |
| CVE-2022-45405 |
Freeing arbitrary nsIInputStream's on a different thread than creation could have led to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2022-11-23 |
2026-01-04 |
| CVE-2022-45404 |
Through a series of popup and window.print() calls, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2022-11-23 |
2026-01-04 |
| CVE-2022-45403 |
Service Workers should not be able to infer information about opaque cross-origin responses; but timing information for cross-origin media combined with Range requests might have allowed them to determine the presence or length of a media file. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2022-11-23 |
2026-01-04 |
| CVE-2023-0468 |
A use-after-free flaw was found in io_uring/poll.c in io_poll_check_events in the io_uring subcomponent in the Linux Kernel due to a race condition of poll_refs. This flaw may cause a NULL pointer dereference. |
Low |
kernel |
是 |
完成修复 |
2022-11-22 |
2026-01-22 |
| CVE-2022-3910 |
Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation. When io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its reference count (leading to Use-After-Free and Local Privilege Escalation). Fixed files are permanently registered to the ring, and should not be put separately. We recommend upgrading past commit https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 |
Important |
kernel4.19.91-26, kernel:4.19, kernel, kernel5.10.134-12, kernel:5.10 |
是 |
完成修复 |
2022-11-22 |
2025-12-09 |
| CVE-2022-45919 |
A race condition flaw leading to a use-after-free issue was found in the Linux kernel media subsystem in the DVB CA EN50221 interface of the DVB core device driver. It could occur in the dvb_ca_en50221_release() function if there is a disconnect after an open, because of the lack of a wait_event. A local user could use this flaw to crash the system or potentially escalate their privileges on the system. |
Moderate |
kernel:4.19, kernel:4.18, kernel, kernel:6.6, kernel:5.10 |
否 |
完成修复 |
2022-11-21 |
2025-12-30 |
| CVE-2022-45146 |
An issue was discovered in the FIPS Java API of Bouncy Castle BC-FJA before 1.0.2.4. Changes to the JVM garbage collector in Java 13 and later trigger an issue in the BC-FJA FIPS modules where it is possible for temporary keys used by the module to be zeroed out while still in use by the module, resulting in errors or potential information loss. NOTE: FIPS compliant users are unaffected because the FIPS certification is only for Java 7, 8, and 11. |
Moderate |
java-11-openjdk |
否 |
完成修复 |
2022-11-21 |
2025-12-05 |
| CVE-2022-35897 |
An stack buffer overflow vulnerability leads to arbitrary code execution issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. If the attacker modifies specific UEFI variables, it can cause a stack overflow, leading to arbitrary code execution. The specific variables are normally locked (read-only) at the OS level and therefore an attack would require direct SPI modification. If an attacker can change the values of at least two variables out of three (SecureBootEnforce, SecureBoot, RestoreBootSettings), it is possible to execute arbitrary code. |
Moderate |
kernel |
否 |
完成修复 |
2022-11-21 |
2025-12-30 |
| CVE-2022-3550 |
A vulnerability classified as critical was found in X.org Server. Affected by this vulnerability is the function _GetCountedString of the file xkb/xkb.c. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211051. |
Important |
xorg-x11-server, xorg-x11-server-Xwayland |
否 |
完成修复 |
2022-11-21 |
2026-01-04 |
| CVE-2022-35407 |
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. A stack buffer overflow leads to arbitrary code execution in the SetupUtility driver on Intel platforms. An attacker can change the values of certain UEFI variables. If the size of the second variable exceeds the size of the first, then the buffer will be overwritten. This issue affects the SetupUtility driver of InsydeH2O. |
Important |
kernel |
否 |
完成修复 |
2022-11-21 |
2025-12-09 |
| CVE-2022-45887 |
A memory leak issue was found in the Linux kernel media subsystem in the TTUSB DEC driver. It could occur in the ttusb_dec_exit_dvb() function because of the lack of a dvb_frontend_detach call. A local user could trigger this flaw by repeatedly plugging and unplugging the device, potentially causing a denial of service condition. |
Moderate |
kernel |
否 |
完成修复 |
2022-11-15 |
2025-12-30 |
| CVE-2022-3920 |
HashiCorp Consul and Consul Enterprise 1.13.0 up to 1.13.3 do not filter cluster filtering's imported nodes and services for HTTP or RPC endpoints used by the UI. Fixed in 1.14.0. |
Important |
docker |
否 |
完成修复 |
2022-11-15 |
2026-01-08 |
| CVE-2022-33985 |
DMA transactions which are targeted at input buffers used for the NvmExpressDxe software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the NvmExpressDxe driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. This issue was fixed in kernel 5.2: 05.27.25, kernel 5.3: 05.36.25, kernel 5.4: 05.44.25, kernel 5.5: 05.52.25 https://www.insyde.com/security-pledge/SA-2022055 |
Important |
kernel |
否 |
完成修复 |
2022-11-15 |
2025-12-09 |
| CVE-2022-33984 |
DMA transactions which are targeted at input buffers used for the SdMmcDevice software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the SdMmcDevice driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. This was fixed in kernel 5.2: 05.27.25, kernel 5.3: 05.36.25, kernel 5.4: 05.44.25, kernel 5.5: 05.52.25 https://www.insyde.com/security-pledge/SA-2022054 |
Important |
kernel |
否 |
完成修复 |
2022-11-15 |
2025-12-09 |
| CVE-2022-33983 |
DMA transactions which are targeted at input buffers used for the NvmExpressLegacy software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the NvmExpressLegacy driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. This issue was fixed in kernel 5.2: 05.27.25, kernel 5.3: 05.36.25, kernel 5.4: 05.44.25, kernel 5.5: 05.52.25 https://www.insyde.com/security-pledge/SA-2022053 |
Important |
kernel |
否 |
完成修复 |
2022-11-15 |
2025-12-09 |
| CVE-2022-33906 |
DMA transactions which are targeted at input buffers used for the FwBlockServiceSmm software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the FwBlockServiceSmm driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in kernel 5.2: 05.27.23, 5.3: 05.36.23, 5.4: 05.44.23, 5.5: 05.52.23 https://www.insyde.com/security-pledge/SA-2022048 |
Moderate |
kernel |
是 |
完成修复 |
2022-11-15 |
2026-01-22 |
| CVE-2022-33905 |
DMA transactions which are targeted at input buffers used for the AhciBusDxe software SMI handler could cause SMRAM corruption (a TOCTOU attack). DMA transactions which are targeted at input buffers used for the software SMI handler used by the AhciBusDxe driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group, Fixed in kernel 5.2: 05.27.23, kernel 5.3: 05.36.23, kernel 5.4: 05.44.23, kernel 5.5: 05.52.23 https://www.insyde.com/security-pledge/SA-2022047 |
Important |
kernel |
否 |
完成修复 |
2022-11-15 |
2025-12-09 |
| CVE-2022-30772 |
Manipulation of the input address in PnpSmm function 0x52 could be used by malware to overwrite SMRAM or OS kernel memory. Function 0x52 of the PnpSmm driver is passed the address and size of data to write into the SMBIOS table, but manipulation of the address could be used by malware to overwrite SMRAM or OS kernel memory. This issue was discovered by Insyde engineering during a security review. This issue is fixed in: Kernel 5.0: 05.09.41 Kernel 5.1: 05.17.43 Kernel 5.2: 05.27.30 Kernel 5.3: 05.36.30 Kernel 5.4: 05.44.30 Kernel 5.5: 05.52.30 https://www.insyde.com/security-pledge/SA-2022065 |
Important |
kernel |
否 |
完成修复 |
2022-11-15 |
2025-12-09 |
| CVE-2022-30771 |
Initialization function in PnpSmm could lead to SMRAM corruption when using subsequent PNP SMI functions Initialization function in PnpSmm could lead to SMRAM corruption when using subsequent PNP SMI functions. This issue was discovered by Insyde engineering during a security review. Fixed in: Kernel 5.1: Version 05.17.25 Kernel 5.2: Version 05.27.25 Kernel 5.3: Version 05.36.25 Kernel 5.4: Version 05.44.25 Kernel 5.5: Version 05.52.25 https://www.insyde.com/security-pledge/SA-2022064 |
Important |
kernel |
否 |
完成修复 |
2022-11-15 |
2025-12-09 |
| CVE-2022-30283 |
In UsbCoreDxe, tampering with the contents of the USB working buffer using DMA while certain USB transactions are in process leads to a TOCTOU problem that could be used by an attacker to cause SMRAM corruption and escalation of privileges The UsbCoreDxe module creates a working buffer for USB transactions outside of SMRAM. The code which uses can be inside of SMM, making the working buffer untrusted input. The buffer can be corrupted by DMA transfers. The SMM code code attempts to sanitize pointers to ensure all pointers refer to the working buffer, but when a pointer is not found in the list of pointers to sanitize, the current action is not aborted, leading to undefined behavior. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in: Kernel 5.0: Version 05.09. 21 Kernel 5.1: Version 05.17.21 Kernel 5.2: Version 05.27.21 Kernel 5.3: Version 05.36.21 Kernel 5.4: Version 05.44.21 Kernel 5.5: Version 05.52.21 https://www.insyde.com/security-pledge/SA-2022063 |
Important |
kernel |
否 |
完成修复 |
2022-11-15 |
2025-12-09 |
| CVE-2022-29279 |
Use of a untrusted pointer allows tampering with SMRAM and OS memory in SdHostDriver and SdMmcDevice Use of a untrusted pointer allows tampering with SMRAM and OS memory in SdHostDriver and SdMmcDevice. This issue was discovered by Insyde during security review. It was fixed in: Kernel 5.0: version 05.09.17 Kernel 5.1: version 05.17.17 Kernel 5.2: version 05.27.17 Kernel 5.3: version 05.36.17 Kernel 5.4: version 05.44.17 Kernel 5.5: version 05.52.17 https://www.insyde.com/security-pledge/SA-2022062 |
Important |
kernel |
否 |
完成修复 |
2022-11-15 |
2025-12-09 |
| CVE-2022-29278 |
Incorrect pointer checks within the NvmExpressDxe driver can allow tampering with SMRAM and OS memory Incorrect pointer checks within the NvmExpressDxe driver can allow tampering with SMRAM and OS memory. This issue was discovered by Insyde during security review. Fixed in: Kernel 5.1: Version 05.17.23 Kernel 5.2: Version 05.27.23 Kernel 5.3: Version 05.36.23 Kernel 5.4: Version 05.44.23 Kernel 5.5: Version 05.52.23 https://www.insyde.com/security-pledge/SA-2022061 |
Important |
kernel |
否 |
完成修复 |
2022-11-15 |
2025-12-09 |
| CVE-2022-29276 |
SMI functions in AhciBusDxe use untrusted inputs leading to corruption of SMRAM. SMI functions in AhciBusDxe use untrusted inputs leading to corruption of SMRAM. This issue was discovered by Insyde during security review. It was fixed in: Kernel 5.0: version 05.09.18 Kernel 5.1: version 05.17.18 Kernel 5.2: version 05.27.18 Kernel 5.3: version 05.36.18 Kernel 5.4: version 05.44.18 Kernel 5.5: version 05.52.18 https://www.insyde.com/security-pledge/SA-2022059 |
Important |
kernel |
否 |
完成修复 |
2022-11-15 |
2025-12-09 |
| CVE-2022-29275 |
In UsbCoreDxe, untrusted input may allow SMRAM or OS memory tampering Use of untrusted pointers could allow OS or SMRAM memory tampering leading to escalation of privileges. This issue was discovered by Insyde during security review. It was fixed in: Kernel 5.0: version 05.09.21 Kernel 5.1: version 05.17.21 Kernel 5.2: version 05.27.21 Kernel 5.3: version 05.36.21 Kernel 5.4: version 05.44.21 Kernel 5.5: version 05.52.21 https://www.insyde.com/security-pledge/SA-2022058 |
Important |
kernel |
否 |
完成修复 |
2022-11-15 |
2025-12-09 |
| CVE-2022-45198 |
Pillow before 9.2.0 performs Improper Handling of Highly Compressed GIF Data (Data Amplification). |
Important |
python-pillow |
否 |
完成修复 |
2022-11-14 |
2026-01-04 |
| CVE-2022-40735 |
The Diffie-Hellman Key Agreement Protocol allows use of long exponents that arguably make certain calculations unnecessarily expensive, because the 1996 van Oorschot and Wiener paper found that "(appropriately) short exponents" can be used when there are adequate subgroup constraints, and these short exponents can lead to less expensive calculations than for long exponents. This issue is different from CVE-2002-20001 because it is based on an observation about exponent size, rather than an observation about numbers that are not public keys. The specific situations in which calculation expense would constitute a server-side vulnerability depend on the protocol (e.g., TLS, SSH, or IKE) and the DHE implementation details. In general, there might be an availability concern because of server-side resource consumption from DHE modular-exponentiation calculations. Finally, it is possible for an attacker to exploit this vulnerability and CVE-2002-20001 together. |
Important |
edk2 |
否 |
完成修复 |
2022-11-14 |
2026-01-08 |
| CVE-2022-3903 |
An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system. |
Low |
kernel |
是 |
完成修复 |
2022-11-14 |
2026-01-23 |
| CVE-2022-33909 |
DMA transactions which are targeted at input buffers used for the HddPassword software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the HddPassword driver could cause SMRAM corruption through a TOCTOU attack..This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in kernel Kernel 5.2: 05.27.23, Kernel 5.3: 05.36.23, Kernel 5.4: 05.44.23, Kernel 5.5: 05.52.23 https://www.insyde.com/security-pledge/SA-2022051 |
Important |
kernel |
否 |
完成修复 |
2022-11-14 |
2025-12-09 |
| CVE-2022-33908 |
DMA transactions which are targeted at input buffers used for the SdHostDriver software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the SdHostDriver driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in kernel 5.2: 05.27.25, kernel 5.3: 05.36.25, kernel 5.4: 05.44.25, kernel 5.5: 05.52.25 https://www.insyde.com/security-pledge/SA-2022050 |
Important |
kernel |
否 |
完成修复 |
2022-11-14 |
2025-12-09 |
| CVE-2022-45199 |
Pillow before 9.3.0 allows denial of service via SAMPLESPERPIXEL. |
Important |
python-pillow |
否 |
完成修复 |
2022-11-13 |
2026-01-04 |
| CVE-2022-26341 |
Insufficiently protected credentials in software in Intel(R) AMT SDK before version 16.0.4.1, Intel(R) EMA before version 1.7.1 and Intel(R) MC before version 2.3.2 may allow an authenticated user to potentially enable escalation of privilege via network access. |
Important |
mc |
否 |
完成修复 |
2022-11-11 |
2026-01-05 |
| CVE-2022-39394 |
Wasmtime is a standalone runtime for WebAssembly. Prior to version 2.0.2, there is a bug in Wasmtime's C API implementation where the definition of the `wasmtime_trap_code` does not match its declared signature in the `wasmtime/trap.h` header file. This discrepancy causes the function implementation to perform a 4-byte write into a 1-byte buffer provided by the caller. This can lead to three zero bytes being written beyond the 1-byte location provided by the caller. This bug has been patched and users should upgrade to Wasmtime 2.0.2. This bug can be worked around by providing a 4-byte buffer casted to a 1-byte buffer when calling `wasmtime_trap_code`. Users of the `wasmtime` crate are not affected by this issue, only users of the C API function `wasmtime_trap_code` are affected. |
Critical |
firefox |
否 |
完成修复 |
2022-11-10 |
2026-01-04 |
| CVE-2022-39393 |
Wasmtime is a standalone runtime for WebAssembly. Prior to version 2.0.2, there is a bug in Wasmtime's implementation of its pooling instance allocator where when a linear memory is reused for another instance the initial heap snapshot of the prior instance can be visible, erroneously to the next instance. This bug has been patched and users should upgrade to Wasmtime 2.0.2. Other mitigations include disabling the pooling allocator and disabling the `memory-init-cow`. |
Important |
firefox |
否 |
完成修复 |
2022-11-10 |
2026-01-04 |
| CVE-2022-39392 |
Wasmtime is a standalone runtime for WebAssembly. Prior to version 2.0.2, there is a bug in Wasmtime's implementation of its pooling instance allocator when the allocator is configured to give WebAssembly instances a maximum of zero pages of memory. In this configuration, the virtual memory mapping for WebAssembly memories did not meet the compiler-required configuration requirements for safely executing WebAssembly modules. Wasmtime's default settings require virtual memory page faults to indicate that wasm reads/writes are out-of-bounds, but the pooling allocator's configuration would not create an appropriate virtual memory mapping for this meaning out of bounds reads/writes can successfully read/write memory unrelated to the wasm sandbox within range of the base address of the memory mapping created by the pooling allocator. This bug is not applicable with the default settings of the `wasmtime` crate. This bug can only be triggered by setting `InstanceLimits::memory_pages` to zero. This is expected to be a very rare configuration since this means that wasm modules cannot allocate any pages of linear memory. All wasm modules produced by all current toolchains are highly likely to use linear memory, so it's expected to be unlikely that this configuration is set to zero by any production embedding of Wasmtime. This bug has been patched and users should upgrade to Wasmtime 2.0.2. This bug can be worked around by increasing the `memory_pages` allotment when configuring the pooling allocator to a value greater than zero. If an embedding wishes to still prevent memory from actually being used then the `Store::limiter` method can be used to dynamically disallow growth of memory beyond 0 bytes large. Note that the default `memory_pages` value is greater than zero. |
Important |
firefox |
否 |
完成修复 |
2022-11-10 |
2026-01-04 |
| CVE-2022-34666 |
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service. |
Moderate |
kernel |
是 |
完成修复 |
2022-11-10 |
2026-01-22 |
| CVE-2022-2414 |
Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests. |
Important |
pki-core:10.6, pki-deps:10.6, pki-core |
否 |
完成修复 |
2022-11-10 |
2026-01-04 |
| CVE-2020-12930 |
A flaw was found in hw. Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges, potentially leading to a loss of integrity. |
Important |
kernel |
否 |
完成修复 |
2022-11-10 |
2025-12-09 |
| CVE-2022-39377 |
An arithmetic overflow issue was discovered in Sysstat on 32-bit systems. The allocate_structures() function in sa_common.c insufficiently checks bounds before arithmetic multiplication, allowing an overflow in the size allocated for the buffer representing system activities. The vulnerability can be triggered when displaying activity data files and may lead to memory corruption or possibly arbitrary code execution due to an incorrectly sized buffer. |
Moderate |
sysstat |
否 |
完成修复 |
2022-11-09 |
2026-01-25 |
| CVE-2022-31253 |
A Untrusted Search Path vulnerability in openldap2 of openSUSE Factory allows local attackers with control of the ldap user or group to change ownership of arbitrary directory entries to this user/group, leading to escalation to root. This issue affects: openSUSE Factory openldap2 versions prior to 2.6.3-404.1. |
Important |
openldap |
否 |
完成修复 |
2022-11-09 |
2026-01-09 |
| CVE-2022-23831 |
Insufficient validation of the IOCTL input buffer in AMD ?Prof may allow an attacker to send an arbitrary buffer leading to a potential Windows kernel crash resulting in denial of service. |
Important |
kernel |
否 |
完成修复 |
2022-11-09 |
2025-12-09 |
| CVE-2022-45059 |
An issue was discovered in Varnish Cache 7.x before 7.1.2 and 7.2.x before 7.2.1. A request smuggling attack can be performed on Varnish Cache servers by requesting that certain headers are made hop-by-hop, preventing the Varnish Cache servers from forwarding critical headers to the backend. |
Important |
varnish, varnish:6 |
否 |
完成修复 |
2022-11-08 |
2025-12-30 |
| CVE-2022-39328 |
A race condition was found in Grafana in the middleware logic that could allow bypassing authentication. This flaw allows an unauthenticated user to successfully query an administration endpoint under a heavy load by using a load testing script hitting specific endpoints. |
Important |
grafana, grafana-pcp |
否 |
完成修复 |
2022-11-08 |
2026-01-04 |
| CVE-2022-23814 |
Failure to validate addresses provided by software to BIOS commands may result in a potential loss of integrity of guest memory in a confidential compute environment. |
Moderate |
kernel |
否 |
完成修复 |
2022-11-08 |
2025-12-29 |
| CVE-2020-12931 |
A flaw was found in hw. Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges, potentially leading to a loss of integrity. |
Important |
kernel |
否 |
完成修复 |
2022-11-08 |
2025-12-09 |
| CVE-2022-42919 |
Python 3.9.x and 3.10.x through 3.10.8 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus, this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.4, but users would need to make specific uncommon API calls in order to do that in CPython before 3.9. |
Important |
python3, python39:3.9 |
否 |
完成修复 |
2022-11-07 |
2026-01-09 |
| CVE-2022-3872 |
An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. |
Moderate |
qemu-kvm-ma, virt:an, qemu-kvm |
是 |
完成修复 |
2022-11-07 |
2025-12-18 |
| CVE-2022-43945 |
The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Important |
kernel |
是 |
完成修复 |
2022-11-04 |
2025-12-09 |
| CVE-2022-2509 |
A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function. |
Important |
gnutls |
否 |
完成修复 |
2022-11-04 |
2026-01-04 |
| CVE-2022-44638 |
A flaw was found in pixman. This issue causes an out-of-bounds write in rasterize_edges_8 due to an integer overflow in pixman_sample_floor_y. This can result in data corruption, a crash, or code execution. |
Moderate |
pixman |
否 |
完成修复 |
2022-11-03 |
2026-01-25 |
| CVE-2022-35717 |
"IBM InfoSphere Information Server 11.7 could allow a locally authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-"Force ID: 231361. |
Important |
kernel |
否 |
完成修复 |
2022-11-03 |
2025-12-09 |
| CVE-2022-3202 |
A NULL pointer dereference flaw in diFree in fs/jfs/inode.c in Journaled File System (JFS)in the Linux kernel. This could allow a local attacker to crash the system or leak kernel internal information. |
Important |
kernel, kernel:6.6, kernel:4.19, kernel:5.10, kernel(ANCK)4.19 |
是 |
完成修复 |
2022-11-03 |
2025-12-09 |
| CVE-2022-43995 |
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture. |
Important |
sudo |
否 |
完成修复 |
2022-11-02 |
2026-01-08 |
| CVE-2022-41716 |
Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\\x00C=D" sets the variables "A=B" and "C=D". |
Important |
golang |
是 |
完成修复 |
2022-11-02 |
2025-12-10 |
| CVE-2022-2625 |
A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser. |
Important |
postgresql:13, postgresql:12, postgresql |
否 |
完成修复 |
2022-11-02 |
2026-01-04 |
| CVE-2022-42800 |
This issue was addressed with improved checks. This issue is fixed in iOS 15.7.1 and iPadOS 15.7.1, macOS Ventura 13, watchOS 9.1, iOS 16.1 and iPadOS 16, macOS Monterey 12.6.1, macOS Big Sur 11.7.1. A user may be able to cause unexpected app termination or arbitrary code execution. |
Important |
rsync |
否 |
完成修复 |
2022-11-01 |
2026-01-04 |
| CVE-2022-42252 |
If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header. |
Important |
tomcat, tomcatjss |
否 |
完成修复 |
2022-11-01 |
2025-12-30 |
| CVE-2022-3786 |
A stack-based buffer overflow was found in the way OpenSSL processes X.509 certificates with a specially crafted email address field. This issue could cause a server or a client application compiled with OpenSSL to crash or possibly execute remote code when trying to process the malicious certificate. |
Important |
compat-openssl10, edk2, openssl098e, openssl, compat-openssl11, ovmf, shim |
否 |
完成修复 |
2022-11-01 |
2026-01-07 |
| CVE-2022-3602 |
A stack-based buffer overflow was found in the way OpenSSL processes X.509 certificates with a specially crafted email address field. This issue could cause a server or a client application compiled with OpenSSL to crash when trying to process the malicious certificate. |
Important |
compat-openssl10, edk2, openssl098e, openssl, compat-openssl11, ovmf, shim |
否 |
完成修复 |
2022-11-01 |
2026-01-07 |
| CVE-2022-32892 |
An access issue was addressed with improvements to the sandbox. This issue is fixed in Safari 16, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Ventura 13. A sandboxed process may be able to circumvent sandbox restrictions. |
Important |
webkit2gtk3 |
否 |
完成修复 |
2022-11-01 |
2025-12-29 |
| CVE-2022-41553 |
Insertion of Sensitive Information into Temporary File vulnerability in Hitachi Infrastructure Analytics Advisor on Linux (Analytics probe component), Hitachi Ops Center Analyzer on Linux (Hitachi Ops Center Analyzer probe component) allows local users to gain sensitive information. This issue affects Hitachi Infrastructure Analytics Advisor: from 2.0.0-00 through 4.4.0-00; Hitachi Ops Center Analyzer: from 10.0.0-00 before 10.9.0-00. |
Moderate |
kernel |
否 |
完成修复 |
2022-10-31 |
2025-12-23 |
| CVE-2021-40241 |
xfig 3.2.7 is vulnerable to Buffer Overflow. |
Critical |
transfig |
否 |
完成修复 |
2022-10-31 |
2026-01-07 |
| CVE-2022-44034 |
An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove(). |
Moderate |
kernel |
否 |
完成修复 |
2022-10-30 |
2025-12-23 |
| CVE-2022-44033 |
An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach(). |
Moderate |
kernel |
否 |
完成修复 |
2022-10-30 |
2025-12-22 |
| CVE-2022-44032 |
An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach(). |
Moderate |
kernel |
否 |
完成修复 |
2022-10-30 |
2025-12-23 |
| CVE-2022-42916 |
In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26. |
Important |
curl |
否 |
完成修复 |
2022-10-29 |
2026-01-06 |
| CVE-2022-42915 |
curl before 7.86.0 has a double free. If curl is told to use an HTTP proxy for a transfer with a non-HTTP(S) URL, it sets up the connection to the remote server by issuing a CONNECT request to the proxy, and then tunnels the rest of the protocol through. An HTTP proxy might refuse this request (HTTP proxies often only allow outgoing connections to specific port numbers, like 443 for HTTPS) and instead return a non-200 status code to the client. Due to flaws in the error/cleanup handling, this could trigger a double free in curl if one of the following schemes were used in the URL for the transfer: dict, gopher, gophers, ldap, ldaps, rtmp, rtmps, or telnet. The earliest affected version is 7.77.0. |
Important |
curl |
否 |
完成修复 |
2022-10-29 |
2026-01-06 |
| CVE-2022-37426 |
Unrestricted Upload of File with Dangerous Type vulnerability in OpenNebula OpenNebula core on Linux allows File Content Injection. |
Important |
kernel |
否 |
完成修复 |
2022-10-28 |
2025-12-08 |
| CVE-2022-3734 |
** DISPUTED ** A vulnerability was found in a port or fork of Redis. It has been declared as critical. This vulnerability affects unknown code in the library C:/Program Files/Redis/dbghelp.dll. The manipulation leads to uncontrolled search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The identifier of this vulnerability is VDB-212416. NOTE: The official Redis release is not affected. This issue might affect an unofficial fork or port on Windows only. |
Critical |
python-redis |
否 |
完成修复 |
2022-10-28 |
2026-01-10 |
| CVE-2022-3725 |
Crash in the OPUS protocol dissector in Wireshark 3.6.0 to 3.6.8 allows denial of service via packet injection or crafted capture file |
Important |
wireshark |
否 |
完成修复 |
2022-10-27 |
2025-12-29 |
| CVE-2022-3705 |
A vulnerability was found in vim and classified as problematic. Affected by this issue is the function qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue. The name of the patch is d0fab10ed2a86698937e3c3fed2f10bd9bb5e731. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-212324. |
Important |
vim |
否 |
完成修复 |
2022-10-26 |
2026-01-05 |
| CVE-2022-31256 |
A Improper Link Resolution Before File Access ('Link Following') vulnerability in a script called by the sendmail systemd service of openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: SUSE openSUSE Factory sendmail versions prior to 8.17.1-1.1. |
Important |
sendmail |
否 |
完成修复 |
2022-10-26 |
2026-01-04 |