| CVE-2022-2982 |
Use After Free in GitHub repository vim/vim prior to 9.0.0260. |
Important |
vim |
否 |
完成修复 |
2022-08-25 |
2026-01-05 |
| CVE-2022-2255 |
A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing. |
Important |
python39:3.9, mod_wsgi |
否 |
完成修复 |
2022-08-25 |
2026-01-09 |
| CVE-2022-2031 |
A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each other's tickets. A user who has been requested to change their password, can exploit this flaw to obtain and use tickets to other services. |
Important |
samba |
否 |
完成修复 |
2022-08-25 |
2026-01-09 |
| CVE-2021-42523 |
There are two Information Disclosure vulnerabilities in colord, and they lie in colord/src/cd-device-db.c and colord/src/cd-profile-db.c separately. They exist because the 'err_msg' of 'sqlite3_exec' is not releasing after use, while libxml2 emphasizes that the caller needs to release it. |
Important |
colord-gtk, colord |
否 |
完成修复 |
2022-08-25 |
2026-01-04 |
| CVE-2022-32793 |
Multiple out-of-bounds write issues were addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.5, watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6. An app may be able to disclose kernel memory. |
Important |
webkit2gtk3 |
否 |
完成修复 |
2022-08-24 |
2025-12-29 |
| CVE-2022-2946 |
Use After Free in GitHub repository vim/vim prior to 9.0.0246. |
Important |
vim |
否 |
完成修复 |
2022-08-23 |
2026-01-05 |
| CVE-2021-3690 |
A flaw was found in Undertow. A buffer leak on the incoming WebSocket PONG message may lead to memory exhaustion. This flaw allows an attacker to cause a denial of service. The highest threat from this vulnerability is availability. |
Important |
fuse |
否 |
完成修复 |
2022-08-23 |
2026-01-04 |
| CVE-2021-20304 |
A flaw was found in OpenEXR's hufDecode functionality. This flaw allows an attacker who can pass a crafted file to be processed by OpenEXR, to trigger an undefined right shift error. The highest threat from this vulnerability is to system availability. |
Important |
OpenEXR |
否 |
完成修复 |
2022-08-23 |
2026-01-05 |
| CVE-2021-20298 |
A flaw was found in OpenEXR's B44Compressor. This flaw allows an attacker who can submit a crafted file to be processed by OpenEXR, to exhaust all memory accessible to the application. The highest threat from this vulnerability is to system availability. |
Important |
OpenEXR |
否 |
完成修复 |
2022-08-23 |
2026-01-05 |
| CVE-2022-2320 |
A flaw was found in the Xorg-x11-server. The specific flaw exists within the handling of ProcXkbSetDeviceInfo requests. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. This flaw allows an attacker to escalate privileges and execute arbitrary code in the context of root. |
Important |
xorg-x11-server, xorg-x11-server-Xwayland |
否 |
完成修复 |
2022-08-20 |
2026-01-04 |
| CVE-2022-2319 |
A flaw was found in the Xorg-x11-server. An out-of-bounds access issue can occur in the ProcXkbSetGeometry function due to improper validation of the request length. |
Important |
xorg-x11-server |
否 |
完成修复 |
2022-08-20 |
2026-01-04 |
| CVE-2022-2889 |
Use After Free in GitHub repository vim/vim prior to 9.0.0225. |
Important |
vim |
否 |
完成修复 |
2022-08-19 |
2026-01-05 |
| CVE-2022-23460 |
Jsonxx or Json++ is a JSON parser, writer and reader written in C++. In affected versions of jsonxx json parsing may lead to stack exhaustion in an address sanitized (ASAN) build. This issue may lead to Denial of Service if the program using the jsonxx library crashes. This issue exists on the current commit of the jsonxx project and the project itself has been archived. Updates are not expected. Users are advised to find a replacement. |
Important |
lua-json |
否 |
完成修复 |
2022-08-19 |
2026-01-04 |
| CVE-2022-23459 |
Jsonxx or Json++ is a JSON parser, writer and reader written in C++. In affected versions of jsonxx use of the Value class may lead to memory corruption via a double free or via a use after free. The value class has a default assignment operator which may be used with pointer types which may point to alterable data where the pointer itself is not updated. This issue exists on the current commit of the jsonxx project. The project itself has been archived and updates are not expected. Users are advised to find a replacement. |
Critical |
lua-json |
否 |
完成修复 |
2022-08-19 |
2025-12-08 |
| CVE-2022-22489 |
IBM MQ 8.0, (9.0, 9.1, 9.2 LTS), and (9.1 and 9.2 CD) are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 226339. |
Critical |
kernel |
否 |
完成修复 |
2022-08-19 |
2025-12-08 |
| CVE-2022-37768 |
libjpeg commit 281daa9 was discovered to contain an infinite loop via the component Frame::ParseTrailer. |
Important |
libjpeg |
否 |
完成修复 |
2022-08-18 |
2026-01-04 |
| CVE-2022-26373 |
在某些英特尔(R)处理器中,上下文之间返回预测器目标的非透明共享可能允许授权用户通过本地访问潜在地实现信息泄露。 |
Moderate |
kernel |
否 |
完成修复 |
2022-08-18 |
2025-12-23 |
| CVE-2022-21229 |
Improper buffer restrictions for some Intel(R) NUC 9 Extreme Laptop Kit drivers before version 2.2.0.22 may allow an authenticated user to potentially enable escalation of privilege via local access. |
Important |
control-center |
否 |
完成修复 |
2022-08-18 |
2026-01-07 |
| CVE-2022-2862 |
Use After Free in GitHub repository vim/vim prior to 9.0.0221. |
Important |
vim |
否 |
完成修复 |
2022-08-17 |
2026-01-05 |
| CVE-2022-2849 |
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220. |
Important |
vim |
否 |
完成修复 |
2022-08-17 |
2026-01-05 |
| CVE-2022-2845 |
Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218. |
Important |
vim |
否 |
完成修复 |
2022-08-17 |
2026-01-05 |
| CVE-2020-14394 |
An infinite loop flaw was found in the USB xHCI controller emulation of QEMU while computing the length of the Transfer Request Block (TRB) Ring. This flaw allows a privileged guest user to hang the QEMU process on the host, resulting in a denial of service. |
Low |
qemu-kvm |
否 |
完成修复 |
2022-08-17 |
2025-12-18 |
| CVE-2022-38221 |
A buffer overflow in the FTcpListener thread in The Isle Evrima (the dedicated server on Windows and Linux) 0.9.88.07 before 2022-08-12 allows a remote attacker to crash any server with an accessible RCON port, or possibly execute arbitrary code. |
Critical |
kernel |
否 |
完成修复 |
2022-08-15 |
2025-12-08 |
| CVE-2022-2819 |
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0211. |
Important |
vim |
否 |
完成修复 |
2022-08-15 |
2026-01-05 |
| CVE-2022-2818 |
Improper Removal of Sensitive Information Before Storage or Transfer in GitHub repository cockpit-hq/cockpit prior to 2.2.2. |
Important |
cockpit |
否 |
完成修复 |
2022-08-15 |
2026-01-08 |
| CVE-2022-2817 |
Use After Free in GitHub repository vim/vim prior to 9.0.0213. |
Important |
vim |
否 |
完成修复 |
2022-08-15 |
2026-01-05 |
| CVE-2022-2816 |
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212. |
Important |
vim |
否 |
完成修复 |
2022-08-15 |
2026-01-05 |
| CVE-2022-32189 |
A too-short encoded message can cause a panic in Float.GobDecode and Rat GobDecode in math/big in Go before 1.17.13 and 1.18.5, potentially allowing a denial of service. |
Low |
golang, git-lfs, golang-dbus, go-toolset:an8 |
是 |
完成修复 |
2022-08-11 |
2025-12-10 |
| CVE-2022-20382 |
In (TBD) of (TBD), there is a possible out of bounds write due to kernel stack overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-214245176References: Upstream kernel |
Moderate |
kernel |
否 |
完成修复 |
2022-08-11 |
2025-12-23 |
| CVE-2022-20371 |
In dm_bow_dtr and related functions of dm-bow.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-195565510References: Upstream kernel |
Moderate |
kernel |
否 |
完成修复 |
2022-08-11 |
2025-12-23 |
| CVE-2022-20158 |
In bdi_put and bdi_unregister of backing-dev.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182815710References: Upstream kernel |
Moderate |
kernel 5.10, kernel 4.19 |
否 |
完成修复 |
2022-08-11 |
2025-12-23 |
| CVE-2022-1927 |
Buffer Over-read in GitHub repository vim/vim prior to 8.2. |
Important |
vim |
否 |
完成修复 |
2022-08-11 |
2026-01-05 |
| CVE-2022-1897 |
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. |
Important |
vim |
否 |
完成修复 |
2022-08-11 |
2026-01-05 |
| CVE-2022-1785 |
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977. |
Important |
vim |
否 |
完成修复 |
2022-08-11 |
2026-01-05 |
| CVE-2022-35715 |
IBM InfoSphere Information Server 11.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in a stack trace. This information could be used in further attacks against the system. IBM X-Force ID: 231202. |
Moderate |
kernel |
否 |
完成修复 |
2022-08-10 |
2025-12-23 |
| CVE-2022-30629 |
Non-random values for ticket_age_add in session tickets in crypto/tls before Go 1.17.11 and Go 1.18.3 allow an attacker that can observe TLS handshakes to correlate successive connections by comparing ticket ages during session resumption. |
Low |
golang, udica, go-toolset:an8 |
是 |
完成修复 |
2022-08-10 |
2025-12-11 |
| CVE-2022-30580 |
Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows execution of any binaries in the working directory named either "..com" or "..exe" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset. |
Moderate |
golang |
是 |
完成修复 |
2022-08-10 |
2025-12-10 |
| CVE-2022-29804 |
Incorrect conversion of certain invalid paths to valid, absolute paths in Clean in path/filepath before Go 1.17.11 and Go 1.18.3 on Windows allows potential directory traversal attack. |
Important |
golang |
是 |
完成修复 |
2022-08-10 |
2025-12-10 |
| CVE-2022-27456 |
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component VDec::VDec at /sql/sql_type.cc. |
Important |
mariadb |
否 |
完成修复 |
2022-08-10 |
2026-01-04 |
| CVE-2022-27452 |
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.cc. |
Important |
mariadb |
否 |
完成修复 |
2022-08-10 |
2026-01-04 |
| CVE-2022-27449 |
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148. |
Important |
mariadb |
否 |
完成修复 |
2022-08-10 |
2026-01-04 |
| CVE-2022-27448 |
There is an Assertion failure in MariaDB Server v10.9 and below via 'node->pcur->rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc. |
Important |
mariadb |
否 |
完成修复 |
2022-08-10 |
2026-01-04 |
| CVE-2022-27447 |
MariaDB Server v10.9 and below was discovered to contain a use-after-free via the component Binary_string::free_buffer() at /sql/sql_string.h. |
Important |
mariadb |
否 |
完成修复 |
2022-08-10 |
2026-01-04 |
| CVE-2022-27445 |
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/sql_window.cc. |
Important |
mariadb |
否 |
完成修复 |
2022-08-10 |
2026-01-04 |
| CVE-2022-27387 |
MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements. |
Important |
mariadb |
否 |
完成修复 |
2022-08-10 |
2026-01-04 |
| CVE-2022-27386 |
MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc. |
Important |
mariadb |
否 |
完成修复 |
2022-08-10 |
2026-01-04 |
| CVE-2022-27384 |
An issue in the component Item_subselect::init_expr_cache_tracker of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. |
Important |
mariadb |
否 |
完成修复 |
2022-08-10 |
2026-01-04 |
| CVE-2022-27383 |
MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements. |
Important |
mariadb |
否 |
完成修复 |
2022-08-10 |
2026-01-04 |
| CVE-2022-27381 |
An issue in the component Field::set_default of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. |
Important |
mariadb |
否 |
完成修复 |
2022-08-10 |
2026-01-04 |
| CVE-2022-27380 |
An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. |
Important |
mariadb |
否 |
完成修复 |
2022-08-10 |
2026-01-04 |
| CVE-2022-27379 |
An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. |
Important |
mariadb |
否 |
完成修复 |
2022-08-10 |
2026-01-04 |
| CVE-2022-27378 |
An issue in the component Create_tmp_table::finalize of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. |
Important |
mariadb |
否 |
完成修复 |
2022-08-10 |
2026-01-04 |
| CVE-2022-27376 |
MariaDB Server v10.6.5 and below was discovered to contain an use-after-free in the component Item_args::walk_arg, which is exploited via specially crafted SQL statements. |
Important |
mariadb |
否 |
完成修复 |
2022-08-10 |
2026-01-04 |
| CVE-2022-26354 |
A flaw was found in the vhost-vsock device of QEMU. In case of error, an invalid element was not detached from the virtqueue before freeing its memory, leading to memory leakage and other unexpected results. Affected QEMU versions <= 6.2.0. |
Low |
qemu, virt:an |
否 |
完成修复 |
2022-08-10 |
2025-12-18 |
| CVE-2022-1586 |
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT. |
Important |
pcre2 |
否 |
完成修复 |
2022-08-10 |
2026-01-09 |
| CVE-2022-2713 |
Insufficient Session Expiration in GitHub repository cockpit-hq/cockpit prior to 2.2.0. |
Important |
cockpit |
否 |
完成修复 |
2022-08-08 |
2026-01-08 |
| CVE-2022-36882 |
JenkinsGitPlugin4.11.3及更早版本中的跨站点请求伪造(CSRF)漏洞允许攻击者触发配置为使用攻击者指定的Git存储库的作业构建,并导致它们签出攻击者指定的提交。 |
Important |
git-lfs, git |
否 |
完成修复 |
2022-08-03 |
2026-01-05 |
| CVE-2022-35737 |
SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API. |
Moderate |
sqlite |
否 |
完成修复 |
2022-08-03 |
2026-01-25 |
| CVE-2022-32148 |
Improper exposure of client IP addresses in net/http before Go 1.17.12 and Go 1.18.4 can be triggered by calling httputil.ReverseProxy.ServeHTTP with a Request.Header map containing a nil value for the X-Forwarded-For header, which causes ReverseProxy to set the client IP as the value of the X-Forwarded-For header. |
Moderate |
golang, git-lfs, container-tools:3.0, go-toolset:an8 |
是 |
完成修复 |
2022-08-03 |
2025-12-17 |
| CVE-2022-30635 |
Uncontrolled recursion in Decoder.Decode in encoding/gob before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a message which contains deeply nested structures. |
Important |
git-lfs, golang-dbus, go-toolset:an8 |
是 |
完成修复 |
2022-08-03 |
2025-12-17 |
| CVE-2022-30633 |
No description is available for this CVE. |
Moderate |
golang, container-tools:3.0, go-toolset:an8 |
是 |
完成修复 |
2022-08-03 |
2025-12-17 |
| CVE-2022-30632 |
Uncontrolled recursion in Glob in path/filepath before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a path containing a large number of path separators. |
Important |
golang, git-lfs, golang-dbus, container-tools:3.0, go-toolset:an8 |
是 |
完成修复 |
2022-08-03 |
2025-12-11 |
| CVE-2022-30631 |
A flaw was found in golang. Calling the Reader.Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion. |
Important |
golang, golang-dbus, container-tools:an8, container-tools:3.0, go-toolset:an8, gzip |
是 |
完成修复 |
2022-08-03 |
2025-12-11 |
| CVE-2022-30630 |
Uncontrolled recursion in Glob in io/fs before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a path which contains a large number of path separators. |
Important |
golang, git-lfs, golang-dbus, container-tools:3.0, go-toolset:an8 |
是 |
完成修复 |
2022-08-03 |
2025-12-11 |
| CVE-2022-28131 |
No description is available for this CVE. |
Moderate |
golang, container-tools:3.0, go-toolset:an8 |
是 |
完成修复 |
2022-08-03 |
2025-12-11 |
| CVE-2022-1962 |
No description is available for this CVE. |
Moderate |
golang, container-tools:3.0, go-toolset:an8 |
是 |
完成修复 |
2022-08-03 |
2025-12-11 |
| CVE-2022-1705 |
Acceptance of some invalid Transfer-Encoding headers in the HTTP/1 client in net/http before Go 1.17.12 and Go 1.18.4 allows HTTP request smuggling if combined with an intermediate server that also improperly fails to reject the header as invalid. |
Moderate |
golang, git-lfs, container-tools:3.0, go-toolset:an8 |
是 |
完成修复 |
2022-08-03 |
2025-12-11 |
| CVE-2022-31321 |
The foldername parameter in Bolt 5.1.7 was discovered to have incorrect input validation, allowing attackers to perform directory enumeration or cause a Denial of Service (DoS) via a crafted input. |
Critical |
bolt |
否 |
完成修复 |
2022-08-01 |
2026-01-04 |
| CVE-2022-2596 |
Denial of Service in GitHub repository node-fetch/node-fetch prior to 3.2.10. |
Moderate |
firefox |
否 |
完成修复 |
2022-08-01 |
2026-01-24 |
| CVE-2022-2581 |
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104. |
Important |
vim |
否 |
完成修复 |
2022-08-01 |
2026-01-05 |
| CVE-2022-2580 |
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102. |
Important |
vim |
否 |
完成修复 |
2022-08-01 |
2026-01-05 |
| CVE-2022-2571 |
9.0.0101之前的GitHub存储库vim/vim中基于堆的缓冲区溢出。 |
Important |
vim |
否 |
完成修复 |
2022-08-01 |
2026-01-05 |
| CVE-2022-36123 |
The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges. |
Important |
kernel:5.10, kernel:4.19, kernel(ANCK)5.10, kernel:6.6 |
是 |
完成修复 |
2022-07-29 |
2025-12-08 |
| CVE-2022-34568 |
SDL v1.2 was discovered to contain a use-after-free via the XFree function at /src/video/x11/SDL_x11yuv.c. |
Important |
SDL |
否 |
完成修复 |
2022-07-28 |
2026-01-04 |
| CVE-2022-2294 |
Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
Important |
webkitgtk |
否 |
完成修复 |
2022-07-28 |
2025-12-29 |
| CVE-2022-36946 |
从5.18.14开始,Linux内核中net/netfilter/nfnetlink_queue.c中的nfqnl_mangle允许远程攻击者造成拒绝服务(恐慌),因为在nf_queue判决具有一字节nfta_payload属性的情况下,skb_pull可能会遇到负skb->len。 |
Moderate |
kernel |
否 |
完成修复 |
2022-07-27 |
2025-12-23 |
| CVE-2022-2522 |
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0061. |
Important |
vim |
否 |
完成修复 |
2022-07-25 |
2026-01-05 |
| CVE-2022-31169 |
Wasmtime is a standalone runtime for WebAssembly. There is a bug in Wasmtime's code generator, Cranelift, for AArch64 targets where constant divisors can result in incorrect division results at runtime. This affects Wasmtime prior to version 0.38.2 and Cranelift prior to 0.85.2. This issue only affects the AArch64 platform. Other platforms are not affected. The translation rules for constants did not take into account whether sign or zero-extension should happen which resulted in an incorrect value being placed into a register when a division was encountered. The impact of this bug is that programs executing within the WebAssembly sandbox would not behave according to the WebAssembly specification. This means that it is hypothetically possible for execution within the sandbox to go awry and WebAssembly programs could produce unexpected results. This should not impact hosts executing WebAssembly but does affect the correctness of guest programs. This bug has been patched in Wasmtime version 0.38.2 and cranelift-codegen 0.85.2. There are no known workarounds. |
Important |
firefox |
否 |
完成修复 |
2022-07-21 |
2026-01-04 |
| CVE-2022-31146 |
Wasmtime is a standalone runtime for WebAssembly. There is a bug in the Wasmtime's code generator, Cranelift, where functions using reference types may be incorrectly missing metadata required for runtime garbage collection. This means that if a GC happens at runtime then the GC pass will mistakenly think these functions do not have live references to GC'd values, reclaiming them and deallocating them. The function will then subsequently continue to use the values assuming they had not been GC'd, leading later to a use-after-free. This bug was introduced in the migration to the `regalloc2` register allocator that occurred in the Wasmtime 0.37.0 release on 2022-05-20. This bug has been patched and users should upgrade to Wasmtime version 0.38.2. Mitigations for this issue can be achieved by disabling the reference types proposal by passing `false` to `wasmtime::Config::wasm_reference_types` or downgrading to Wasmtime 0.36.0 or prior. |
Important |
firefox |
否 |
完成修复 |
2022-07-21 |
2026-01-04 |
| CVE-2020-36557 |
A race condition in the Linux kernel before 5.6.2 between the VT_DISALLOCATE ioctl and closing/opening of ttys could lead to a use-after-free. |
Moderate |
kernel |
否 |
完成修复 |
2022-07-21 |
2025-12-23 |
| CVE-2022-22424 |
IBM QRadar SIEM 7.3, 7.4, and 7.5 could allow a local user to obtain sensitive information from the TLS key file due to incorrect file permissions. IBM X-Force ID: 223597. |
Moderate |
kernel |
否 |
完成修复 |
2022-07-20 |
2025-12-23 |
| CVE-2021-46828 |
In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections. |
Moderate |
libtirpc |
否 |
完成修复 |
2022-07-20 |
2026-01-25 |
| CVE-2020-36558 |
A race condition in the Linux kernel before 5.5.7 involving VT_RESIZEX could lead to a NULL pointer dereference and general protection fault. |
Moderate |
kernel |
否 |
完成修复 |
2022-07-20 |
2025-12-23 |
| CVE-2022-31144 |
Redis is an in-memory database that persists on disk. A specially crafted `XAUTOCLAIM` command on a stream key in a specific state may result with heap overflow, and potentially remote code execution. This problem affects versions on the 7.x branch prior to 7.0.4. The patch is released in version 7.0.4. |
Important |
redis |
否 |
完成修复 |
2022-07-19 |
2026-01-04 |
| CVE-2022-30532 |
In affected versions of Octopus Deploy, there is no logging of changes to artifacts within Octopus Deploy. |
Moderate |
kernel |
否 |
完成修复 |
2022-07-19 |
2025-12-23 |
| CVE-2022-2122 |
DOS / potential heap overwrite in qtdemux using zlib decompression. Integer overflow in qtdemux element in qtdemux_inflate function which causes a segfault, or could cause a heap overwrite, depending on libc and OS. Depending on the libc used, and the underlying OS capabilities, it could be just a segfault or a heap overwrite. |
Important |
gstreamer, gstreamer1-plugins-good |
否 |
完成修复 |
2022-07-19 |
2026-01-04 |
| CVE-2022-1925 |
DOS / potential heap overwrite in mkv demuxing using HEADERSTRIP decompression. Integer overflow in matroskaparse element in gst_matroska_decompress_data function which causes a heap overflow. Due to restrictions on chunk sizes in the matroskademux element, the overflow can't be triggered, however the matroskaparse element has no size checks. |
Important |
gstreamer1, gstreamer1-plugins-good |
否 |
完成修复 |
2022-07-19 |
2026-01-04 |
| CVE-2022-1924 |
DOS / potential heap overwrite in mkv demuxing using lzo decompression. Integer overflow in matroskademux element in lzo decompression function which causes a segfault, or could cause a heap overwrite, depending on libc and OS. Depending on the libc used, and the underlying OS capabilities, it could be just a segfault or a heap overwrite. If the libc uses mmap for large chunks, and the OS supports mmap, then it is just a segfault (because the realloc before the integer overflow will use mremap to reduce the size of the chunk, and it will start to write to unmapped memory). However, if using a libc implementation that does not use mmap, or if the OS does not support mmap while using libc, then this could result in a heap overwrite. |
Important |
gstreamer1, gstreamer1-plugins-good |
否 |
完成修复 |
2022-07-19 |
2026-01-04 |
| CVE-2022-1923 |
DOS / potential heap overwrite in mkv demuxing using bzip decompression. Integer overflow in matroskademux element in bzip decompression function which causes a segfault, or could cause a heap overwrite, depending on libc and OS. Depending on the libc used, and the underlying OS capabilities, it could be just a segfault or a heap overwrite. If the libc uses mmap for large chunks, and the OS supports mmap, then it is just a segfault (because the realloc before the integer overflow will use mremap to reduce the size of the chunk, and it will start to write to unmapped memory). However, if using a libc implementation that does not use mmap, or if the OS does not support mmap while using libc, then this could result in a heap overwrite. |
Important |
gstreamer1, gstreamer1-plugins-good |
否 |
完成修复 |
2022-07-19 |
2026-01-04 |
| CVE-2022-1922 |
DOS / potential heap overwrite in mkv demuxing using zlib decompression. Integer overflow in matroskademux element in gst_matroska_decompress_data function which causes a segfault, or could cause a heap overwrite, depending on libc and OS. Depending on the libc used, and the underlying OS capabilities, it could be just a segfault or a heap overwrite. If the libc uses mmap for large chunks, and the OS supports mmap, then it is just a segfault (because the realloc before the integer overflow will use mremap to reduce the size of the chunk, and it will start to write to unmapped memory). However, if using a libc implementation that does not use mmap, or if the OS does not support mmap while using libc, then this could result in a heap overwrite. |
Important |
gstreamer1, gstreamer1-plugins-good |
否 |
完成修复 |
2022-07-19 |
2026-01-04 |
| CVE-2022-1921 |
Integer overflow in avidemux element in gst_avi_demux_invert function which allows a heap overwrite while parsing avi files. Potential for arbitrary code execution through heap overwrite. |
Important |
gstreamer1, gstreamer1-plugins-good |
否 |
完成修复 |
2022-07-19 |
2026-01-04 |
| CVE-2021-40153 |
Squashfs-Tools4.5中的unsquash-1.c中的squashfs_opendir将文件名存储在目录项中;然后unsquashfs使用它在unsquash过程中创建新文件。文件名未针对目标目录之外的遍历进行验证,因此允许写入目标之外的位置。 |
Important |
squashfs-tools |
否 |
完成修复 |
2022-07-18 |
2026-01-09 |
| CVE-2016-15003 |
A vulnerability has been found in FileZilla Client 3.17.0.0 and classified as problematic. This vulnerability affects unknown code of the file C:\\Program Files\\FileZilla FTP Client\\uninstall.exe of the component Installer. The manipulation leads to unquoted search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. |
Important |
google-api-python-client |
否 |
完成修复 |
2022-07-18 |
2026-01-05 |
| CVE-2022-31213 |
An issue was discovered in dbus-broker before 31. Multiple NULL pointer dereferences can be found when supplying a malformed XML config file. |
Important |
dbus-broker |
否 |
完成修复 |
2022-07-17 |
2026-01-06 |
| CVE-2022-22460 |
IBM Security Verify Identity Manager 10.0 contains sensitive information in the source code repository that could be used in further attacks against the system. IBM X-Force ID: 225013. |
Low |
kernel |
是 |
完成修复 |
2022-07-14 |
2026-01-23 |
| CVE-2022-22450 |
IBM Security Verify Identity Manager 10.0 could allow a privileged user to upload a malicious file by bypassing extension security in an HTTP request. IBM X-Force ID: 224916. |
Low |
kernel |
是 |
完成修复 |
2022-07-14 |
2026-01-23 |
| CVE-2022-20227 |
In USB driver, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216825460References: Upstream kernel |
Moderate |
kernel |
否 |
完成修复 |
2022-07-13 |
2025-12-23 |
| CVE-2022-29526 |
Go before 1.17.10 and 1.18.x before 1.18.2 has Incorrect Privilege Assignment. When called with a non-zero flags parameter, the Faccessat function could incorrectly report that a file is accessible. |
Moderate |
golang-dbus |
是 |
完成修复 |
2022-07-12 |
2025-12-11 |