| CVE-2021-3748 |
A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process. |
Important |
qemu, virt:an, qemu-kvm |
否 |
完成修复 |
2022-06-15 |
2025-12-09 |
| CVE-2021-3698 |
A flaw was found in Cockpit in versions prior to 260 in the way it handles the certificate verification performed by the System Security Services Daemon (SSSD). This flaw allows client certificates to authenticate successfully, regardless of the Certificate Revocation List (CRL) configuration or the certificate status. The highest threat from this vulnerability is to confidentiality. |
Important |
cockpit, cockpit-session-recording |
否 |
完成修复 |
2022-06-15 |
2026-01-08 |
| CVE-2021-36160 |
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive). |
Important |
httpd:2.4, httpd |
否 |
完成修复 |
2022-06-15 |
2026-01-09 |
| CVE-2021-3612 |
An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. |
Important |
kernel:4.19, kernel(RHCK)4.18, kernel:4.18, kernel:6.6, kernel:5.10 |
是 |
完成修复 |
2022-06-15 |
2025-12-05 |
| CVE-2021-35269 |
NTFS-3G versions < 2021.8.22, when a specially crafted NTFS attribute from the MFT is setup in the function ntfs_attr_setup_flag, a heap buffer overflow can occur allowing for code execution and escalation of privileges. |
Important |
virt:an, ntfs-3g |
否 |
完成修复 |
2022-06-15 |
2025-12-30 |
| CVE-2021-35268 |
In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS inode is loaded in the function ntfs_inode_real_open, a heap buffer overflow can occur allowing for code execution and escalation of privileges. |
Important |
virt:an, ntfs-3g |
否 |
完成修复 |
2022-06-15 |
2025-12-30 |
| CVE-2021-35267 |
NTFS-3G versions < 2021.8.22, a stack buffer overflow can occur when correcting differences in the MFT and MFTMirror allowing for code execution or escalation of privileges when setuid-root. |
Important |
virt:an, ntfs-3g |
否 |
完成修复 |
2022-06-15 |
2025-12-30 |
| CVE-2021-35266 |
In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS inode pathname is supplied in an NTFS image a heap buffer overflow can occur resulting in memory disclosure, denial of service and even code execution. |
Important |
virt:an, ntfs-3g |
否 |
完成修复 |
2022-06-15 |
2025-12-30 |
| CVE-2021-33289 |
In NTFS-3G versions < 2021.8.22, when a specially crafted MFT section is supplied in an NTFS image a heap buffer overflow can occur and allow for code execution. |
Important |
virt:an, ntfs-3g |
否 |
完成修复 |
2022-06-15 |
2025-12-30 |
| CVE-2021-33287 |
In NTFS-3G versions < 2021.8.22, when specially crafted NTFS attributes are read in the function ntfs_attr_pread_i, a heap buffer overflow can occur and allow for writing to arbitrary memory or denial of service of the application. |
Important |
virt:an, ntfs-3g |
否 |
完成修复 |
2022-06-15 |
2025-12-30 |
| CVE-2021-33286 |
In NTFS-3G versions < 2021.8.22, when a specially crafted unicode string is supplied in an NTFS image a heap buffer overflow can occur and allow for code execution. |
Important |
virt:an, ntfs-3g |
否 |
完成修复 |
2022-06-15 |
2025-12-30 |
| CVE-2021-33285 |
In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS attribute is supplied to the function ntfs_get_attribute_value, a heap buffer overflow can occur allowing for memory disclosure or denial of service. The vulnerability is caused by an out-of-bound buffer access which can be triggered by mounting a crafted ntfs partition. The root cause is a missing consistency check after reading an MFT record : the "bytes_in_use" field should be less than the "bytes_allocated" field. When it is not, the parsing of the records proceeds into the wild. |
Important |
virt:an, ntfs-3g |
否 |
完成修复 |
2022-06-15 |
2025-12-30 |
| CVE-2021-33193 |
A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48. |
Important |
httpd:2.4, httpd |
否 |
完成修复 |
2022-06-15 |
2026-01-09 |
| CVE-2020-35492 |
A flaw was found in cairo's image-compositor.c in all versions prior to 1.17.4. This flaw allows an attacker who can provide a crafted input file to cairo's image-compositor (for example, by convincing a user to open a file in an application using cairo, or if an application uses cairo on untrusted input) to cause a stack buffer overflow -> out-of-bounds WRITE. The highest impact from this vulnerability is to confidentiality, integrity, as well as system availability. |
Important |
pixman, cairo |
否 |
完成修复 |
2022-06-15 |
2026-01-04 |
| CVE-2020-35452 |
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow |
Important |
httpd:2.4, httpd |
否 |
完成修复 |
2022-06-15 |
2026-01-09 |
| CVE-2020-27820 |
A vulnerability was found in Linux kernel, where a use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if "unbind" the driver). |
Moderate |
kernel:4.19, kernel(RHCK)4.18, kernel:4.18, kernel:6.6, kernel:5.10 |
否 |
完成修复 |
2022-06-15 |
2025-12-23 |
| CVE-2022-21504 |
The code in UEK6 U3 was missing an appropiate file descriptor count to be missing. This resulted in a use count error that allowed a file descriptor to a socket to be closed and freed while it was still in use by another portion of the kernel. An attack with local access can operate on the socket, and cause a denial of service. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). |
Moderate |
kernel |
否 |
完成修复 |
2022-06-14 |
2025-12-23 |
| CVE-2022-1976 |
A flaw was found in the Linux kernels implementation of IO-URING. An attacker with a local executable permission can create a string of requests which is able to create a use-after-free flaw within the kernel creating memory corruption and possible privilege escalation.\n\n\nUpstream:\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9cae36a094e7e9d6e5fe8b6dcd4642138b3eb0c7 |
Moderate |
kernel |
否 |
完成修复 |
2022-06-14 |
2025-12-23 |
| CVE-2021-40633 |
A memory leak (out-of-memory) in gif2rgb in util/gif2rgb.c in giflib 5.1.4 allows remote attackers trigger an out of memory exception or denial of service via a gif format file. |
Important |
giflib |
否 |
完成修复 |
2022-06-14 |
2026-01-06 |
| CVE-2022-29244 |
npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=`). Anyone who has run `npm pack` or `npm publish` inside a workspace, as of v7.9.0 and v7.13.0 respectively, may be affected and have published files into the npm registry they did not intend to include. Users should upgrade to the latest, patched version of npm v8.11.0, run: npm i -g npm@latest . Node.js versions v16.15.1, v17.19.1, and v18.3.0 include the patched v8.11.0 version of npm. |
Important |
nodejs-packaging, nodejs |
否 |
完成修复 |
2022-06-13 |
2026-01-05 |
| CVE-2022-32981 |
An issue was discovered in the Linux kernel through 5.18.3 on powerpc 32-bit platforms. There is a buffer overflow in ptrace PEEKUSER and POKEUSER (aka PEEKUSR and POKEUSR) when accessing floating point registers. |
Important |
kernel:5.10, kernel:4.19, kernel, kernel:6.6 |
是 |
完成修复 |
2022-06-10 |
2025-12-05 |
| CVE-2022-30610 |
IBM Spectrum Copy Data Management 2.2.0.0 through 2.2.15.0 is vulnerable to reverse tabnabbing where it could allow a page linked to from within IBM Spectrum Copy Data Management to rewrite it. An administrator could enter a link to a malicious URL that another administrator could then click. Once clicked, that malicious URL could then rewrite the original page with a phishing page. IBM X-Force ID: 227363. |
Moderate |
kernel |
否 |
完成修复 |
2022-06-10 |
2025-12-23 |
| CVE-2022-21211 |
This affects all versions of package posix. When invoking the toString method, it will fallback to 0x0 value, as the value of toString is not invokable (not a function), and then it will crash with type-check. |
Important |
lua-posix |
否 |
完成修复 |
2022-06-10 |
2026-01-04 |
| CVE-2022-31782 |
ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based buffer overflow. |
Important |
freetype |
否 |
完成修复 |
2022-06-02 |
2026-01-07 |
| CVE-2022-26491 |
An issue was discovered in Pidgin before 2.14.9. A remote attacker who can spoof DNS responses can redirect a client connection to a malicious server. The client will perform TLS certificate verification of the malicious domain name instead of the original XMPP service domain, allowing the attacker to take over control over the XMPP connection and to obtain user credentials and all communication content. This is similar to CVE-2022-24968. |
Moderate |
pidgin |
否 |
完成修复 |
2022-06-02 |
2026-01-25 |
| CVE-2022-24903 |
Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message reception. It is best practice not to directly expose them to the public. When this practice is followed, the risk is considerably lower. Module `imdiag` is a diagnostics module primarily intended for testbench runs. We do not expect it to be present on any production installation. Octet-counted framing is not very common. Usually, it needs to be specifically enabled at senders. If users do not need it, they can turn it off for the most important modules. This will mitigate the vulnerability. |
Important |
rsyslog |
否 |
完成修复 |
2022-06-01 |
2026-01-09 |
| CVE-2022-26720 |
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Security Update 2022-004 Catalina, macOS Monterey 12.4, macOS Big Sur 11.6.6. A malicious application may be able to execute arbitrary code with kernel privileges. |
Important |
httpd |
否 |
完成修复 |
2022-05-26 |
2026-01-09 |
| CVE-2022-1664 |
Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs. |
Low |
dpkg |
否 |
完成修复 |
2022-05-26 |
2026-01-25 |
| CVE-2022-29361 |
** DISPUTED ** Improper parsing of HTTP requests in Pallets Werkzeug v2.1.0 and below allows attackers to perform HTTP Request Smuggling using a crafted HTTP request with multiple requests included inside the body. NOTE: the vendor's position is that this behavior can only occur in unsupported configurations involving development mode and an HTTP server from outside the Werkzeug project. |
Critical |
python-werkzeug |
否 |
完成修复 |
2022-05-24 |
2026-01-09 |
| CVE-2022-1786 |
A use-after-free flaw was found in the Linux kernel’s io_uring subsystem in the way a user sets up a ring with IORING_SETUP_IOPOLL with more than one task completing submissions on this ring. This flaw allows a local user to crash or escalate their privileges on the system. |
Important |
kernel:5.10, kernel:4.19, kernel(ANCK)5.10, kernel:6.6 |
是 |
完成修复 |
2022-05-24 |
2025-12-04 |
| CVE-2022-29170 |
Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn’t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds. |
Important |
grafana |
否 |
完成修复 |
2022-05-20 |
2026-01-04 |
| CVE-2022-28660 |
The querier component in Grafana Enterprise Logs 1.1.x through 1.3.x before 1.4.0 does not require authentication when X-Scope-OrgID is used. Versions 1.2.1, 1.3.1, and 1.4.0 contain the bugfix. This affects -auth.type=enterprise in microservices mode |
Critical |
grafana |
否 |
完成修复 |
2022-05-20 |
2026-01-10 |
| CVE-2022-30958 |
A cross-site request forgery (CSRF) vulnerability in Jenkins SSH Plugin 2.6.1 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. |
Important |
openssh |
否 |
完成修复 |
2022-05-18 |
2026-01-09 |
| CVE-2021-42704 |
Inkscape version 0.91 is vulnerable to an out-of-bounds write, which may allow an attacker to arbitrary execute code. |
Important |
inkscape |
否 |
完成修复 |
2022-05-18 |
2026-01-06 |
| CVE-2022-1679 |
Linux内核的Atheros无线适配器驱动程序中发现了一个释放后使用缺陷,用户会强制ath9k_htc_wait_for_target函数因某些输入消息而失败。此缺陷允许本地用户崩溃或可能提升其在系统上的权限。 |
Moderate |
kernel |
否 |
完成修复 |
2022-05-16 |
2025-12-23 |
| CVE-2021-45402 |
The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a "pointer leak." |
Moderate |
kernel:5.10, kernel:4.19, kernel(ANCK)4.19, kernel:6.6 |
否 |
完成修复 |
2022-05-16 |
2025-12-23 |
| CVE-2021-4204 |
An out-of-bounds (OOB) memory access flaw was found in the Linux kernel's eBPF due to an Improper Input Validation. This flaw allows a local attacker with a special privilege to crash the system or leak internal information. |
Important |
kernel:4.19, kernel:4.18, kernel, kernel:6.6, kernel:5.10 |
是 |
完成修复 |
2022-05-16 |
2025-12-04 |
| CVE-2021-33200 |
kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux->alu_limit. |
Important |
kernel:5.10, kernel:4.19, kernel(ANCK)4.19, kernel:6.6 |
是 |
完成修复 |
2022-05-16 |
2025-12-04 |
| CVE-2021-23133 |
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket. |
Important |
kernel:5.10, kernel:4.19, kernel(ANCK)4.19, kernel:6.6 |
是 |
完成修复 |
2022-05-16 |
2025-12-04 |
| CVE-2021-22600 |
A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755 |
Important |
kernel:5.10, kernel:4.19, kernel(ANCK)4.19, kernel:6.6 |
是 |
完成修复 |
2022-05-16 |
2025-12-04 |
| CVE-2020-26147 |
An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. |
Moderate |
kernel:5.10, kernel:4.19, kernel(ANCK)4.19, kernel:6.6 |
否 |
完成修复 |
2022-05-16 |
2025-12-23 |
| CVE-2022-20117 |
In (TBD) of (TBD), there is a possible way to decrypt local data encrypted by the GSC due to improperly used crypto. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-217475903References: N/A |
Moderate |
kernel |
否 |
完成修复 |
2022-05-10 |
2025-12-23 |
| CVE-2022-1734 |
A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine. |
Important |
kernel:4.19, kernel(ANCK)5.10, kernel:6.6, kernel:5.10, kernel(ANCK)4.19 |
是 |
完成修复 |
2022-05-10 |
2025-12-05 |
| CVE-2022-1652 |
Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system. |
Important |
kernel:5.10, kernel:4.19, kernel(ANCK)5.10, kernel:6.6 |
是 |
完成修复 |
2022-05-10 |
2025-12-05 |
| CVE-2022-30524 |
There is an invalid memory access in the TextLine class in TextOutputDev.cc in Xpdf 4.0.4 because the text extractor mishandles characters at large y coordinates. It can be triggered by (for example) sending a crafted pdf file to the pdftotext binary, which allows a remote attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact. |
Important |
xpdf |
否 |
完成修复 |
2022-05-09 |
2026-01-04 |
| CVE-2022-28738 |
A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations. |
Important |
ruby, ruby:3.0 |
否 |
完成修复 |
2022-05-09 |
2026-01-04 |
| CVE-2022-1619 |
Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution |
Important |
vim |
否 |
完成修复 |
2022-05-08 |
2026-01-06 |
| CVE-2022-29167 |
Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`. |
Moderate |
firefox |
否 |
完成修复 |
2022-05-06 |
2026-01-24 |
| CVE-2022-25324 |
All versions of package bignum are vulnerable to Denial of Service (DoS) due to a type-check exception in V8, when verifying the type of the second argument to the .powm function, V8 will crash regardless of Node try/catch blocks. |
Important |
perl-bignum |
否 |
完成修复 |
2022-05-06 |
2026-01-05 |
| CVE-2022-22368 |
IBM Spectrum Scale 5.1.0 through 5.1.3.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 221012. |
Moderate |
kernel |
否 |
完成修复 |
2022-05-03 |
2025-12-23 |
| CVE-2021-41959 |
JerryScript Git version 14ff5bf does not sufficiently track and release allocated memory via jerry-core/ecma/operations/ecma-regexp-object.c after RegExp, which causes a memory leak. |
Important |
git |
否 |
完成修复 |
2022-05-03 |
2026-01-06 |
| CVE-2022-29970 |
Sinatra before 2.2.0 does not validate that the expanded path matches public_dir when serving static files. |
Important |
pcs |
否 |
完成修复 |
2022-05-02 |
2026-01-05 |
| CVE-2022-1012 |
A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem. |
Important |
kernel:4.19, kernel(RHCK)4.18, kernel(ANCK)5.10, kernel:4.18, kernel:6.6, kernel:5.10, kernel(ANCK)4.19 |
是 |
完成修复 |
2022-05-02 |
2025-12-04 |
| CVE-2018-25032 |
zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches. |
Important |
mingw-zlib, rsync, zlib |
否 |
完成修复 |
2022-04-29 |
2026-01-10 |
| CVE-2022-1271 |
An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system. |
Important |
xz, xz-java, gzip |
否 |
完成修复 |
2022-04-28 |
2025-12-13 |
| CVE-2022-1154 |
Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646. |
Important |
vim |
否 |
完成修复 |
2022-04-28 |
2026-01-06 |
| CVE-2022-27239 |
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges. |
Important |
cifs-utils |
否 |
完成修复 |
2022-04-27 |
2026-01-08 |
| CVE-2022-24881 |
Ballcat Codegen provides the function of online editing code to generate templates. In versions prior to 1.0.0.beta.2, attackers can implement remote code execution through malicious code injection of the template engine. This happens because Velocity and freemarker templates are introduced but input verification is not done. The fault is rectified in version 1.0.0.beta.2. |
Critical |
freerdp |
否 |
完成修复 |
2022-04-26 |
2026-01-10 |
| CVE-2022-24882 |
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). In versions prior to 2.7.0, NT LAN Manager (NTLM) authentication does not properly abort when someone provides and empty password value. This issue affects FreeRDP based RDP Server implementations. RDP clients are not affected. The vulnerability is patched in FreeRDP 2.7.0. There are currently no known workarounds. |
Important |
freerdp |
否 |
完成修复 |
2022-04-22 |
2026-01-07 |
| CVE-2022-24826 |
On Windows, if Git LFS operates on a malicious repository with a `..exe` file as well as a file named `git.exe`, and `git.exe` is not found in `PATH`, the `..exe` program will be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. Similarly, if the malicious repository contains files named `..exe` and `cygpath.exe`, and `cygpath.exe` is not found in `PATH`, the `..exe` program will be executed when certain Git LFS commands are run. More generally, if the current working directory contains any file with a base name of `.` and a file extension from `PATHEXT` (except `.bat` and `.cmd`), and also contains another file with the same base name as a program Git LFS intends to execute (such as `git`, `cygpath`, or `uname`) and any file extension from `PATHEXT` (including `.bat` and `.cmd`), then, on Windows, when Git LFS attempts to execute the intended program the `..exe`, `..com`, etc., file will be executed instead, but only if the intended program is not found in any directory listed in `PATH`. The vulnerability occurs because when Git LFS detects that the program it intends to run does not exist in any directory listed in `PATH` then Git LFS passes an empty string as the executable file path to the Go `os/exec` package, which contains a bug such that, on Windows, it prepends the name of the current working directory (i.e., `.`) to the empty string without adding a path separator, and as a result searches in that directory for a file with the base name `.` combined with any file extension from `PATHEXT`, executing the first one it finds. (The reason `..bat` and `..cmd` files are not executed in the same manner is that, although the Go `os/exec` package tries to execute them just as it does a `..exe` file, the Microsoft Win32 API `CreateProcess()` family of functions have an undocumented feature in that they apparently recognize when a caller is attempting to execute a batch script file and instead run the `cmd.exe` command interpreter, passing the full set of command line arguments as parameters. These are unchanged from the command line arguments set by Git LFS, and as such, the intended program's name is the first, resulting in a command line like `cmd.exe /c git`, which then fails.) Git LFS has resolved this vulnerability by always reporting an error when a program is not found in any directory listed in `PATH` rather than passing an empty string to the Go `os/exec` package in this case. The bug in the Go `os/exec` package has been reported to the Go project and is expected to be patched after this security advisory is published. The problem was introduced in version 2.12.1 and is patched in version 3.1.3. Users of affected versions should upgrade to version 3.1.3. There are currently no known workarounds at this time. |
Important |
git |
否 |
完成修复 |
2022-04-19 |
2025-12-13 |
| CVE-2021-39078 |
IBM Security Guardium 10.5 stores user credentials in plain clear text which can be read by a local privileged user. IBM X-Force ID: 215589. |
Moderate |
kernel |
否 |
完成修复 |
2022-04-19 |
2026-01-22 |
| CVE-2021-39076 |
IBM Security Guardium 10.5 and 11.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt sensitive information. IBM X-Force ID: 215585. |
Important |
kernel |
否 |
完成修复 |
2022-04-19 |
2025-12-04 |
| CVE-2021-3100 |
The Apache Log4j hotpatch package before log4j-cve-2021-44228-hotpatch-1.1-13 didn’t mimic the permissions of the JVM being patched, allowing it to escalate privileges. |
Important |
kernel |
否 |
完成修复 |
2022-04-19 |
2025-12-04 |
| CVE-2021-3681 |
A flaw was found in Ansible Galaxy Collections. When collections are built manually, any files in the repository directory that are not explicitly excluded via the ``build_ignore`` list in "galaxy.yml" include files in the ``.tar.gz`` file. This contains sensitive info, such as the user's Ansible Galaxy API key and any secrets in ``ansible`` or ``ansible-playbook`` verbose output without the``no_log`` redaction. Currently, there is no way to deprecate a Collection Or delete a Collection Version. Once published, anyone who downloads or installs the collection can view the secrets. |
Important |
ansible-core |
否 |
完成修复 |
2022-04-18 |
2026-01-06 |
| CVE-2020-15778 |
** DISPUTED ** scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows." |
Important |
openssh, openSSH |
否 |
完成修复 |
2022-04-18 |
2026-01-09 |
| CVE-2011-4917 |
In the Linux kernel through 3.1 there is an information disclosure issue via /proc/stat. |
Moderate |
kernel |
否 |
完成修复 |
2022-04-18 |
2025-12-23 |
| CVE-2022-27457 |
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_mb_wc_latin1 at /strings/ctype-latin1.c. |
Important |
mariadb:10.5, mariadb |
否 |
完成修复 |
2022-04-14 |
2026-01-04 |
| CVE-2022-27455 |
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_wildcmp_8bit_impl at /strings/ctype-simple.c. |
Important |
mariadb:10.5, mariadb |
否 |
完成修复 |
2022-04-14 |
2026-01-04 |
| CVE-2022-27451 |
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/field_conv.cc. |
Important |
mariadb:10.5, mariadb |
否 |
完成修复 |
2022-04-14 |
2026-01-04 |
| CVE-2022-27446 |
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.h. |
Important |
mariadb:10.5, mariadb |
否 |
完成修复 |
2022-04-14 |
2026-01-04 |
| CVE-2022-27444 |
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_subselect.cc. |
Important |
mariadb:10.5, mariadb |
否 |
完成修复 |
2022-04-14 |
2026-01-04 |
| CVE-2022-1304 |
An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem. |
Important |
e2fsprogs |
否 |
完成修复 |
2022-04-14 |
2026-01-09 |
| CVE-2022-25648 |
The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection. |
Critical |
git-lfs, git |
否 |
完成修复 |
2022-04-13 |
2026-01-09 |
| CVE-2022-28347 |
A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name. |
Important |
python-django |
否 |
完成修复 |
2022-04-12 |
2026-01-04 |
| CVE-2022-28346 |
An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs. |
Important |
python-django |
否 |
完成修复 |
2022-04-12 |
2026-01-04 |
| CVE-2022-27382 |
MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order. |
Important |
mariadb:10.5, mariadb |
否 |
完成修复 |
2022-04-12 |
2026-01-04 |
| CVE-2022-24838 |
Nextcloud Calendar is a calendar application for the nextcloud framework. SMTP Command Injection in Appointment Emails via Newlines: as newlines and special characters are not sanitized in the email value in the JSON request, a malicious attacker can inject newlines to break out of the `RCPT TO: ` SMTP command and begin injecting arbitrary SMTP commands. It is recommended that Calendar is upgraded to 3.2.2. There are no workaround available. |
Critical |
ocaml-calendar |
否 |
完成修复 |
2022-04-11 |
2026-01-10 |
| CVE-2022-24829 |
Garden is an automation platform for Kubernetes development and testing. In versions prior to 0.12.39 multiple endpoints did not require authentication. In some operating modes this allows for an attacker to gain access to the application erroneously. The configuration is leaked through the /api endpoint on the local server that is responsible for serving the Garden dashboard. At the moment, this server is accessible to 0.0.0.0 which makes it accessible to anyone on the same network (or anyone on the internet if they are on a public, static IP). This may lead to the ability to compromise credentials, secrets or environment variables. Users are advised to upgrade to version 0.12.39 as soon as possible. Users unable to upgrade should use a firewall blocking access to port 9777 from all untrusted network machines. |
Critical |
kubernetes |
否 |
完成修复 |
2022-04-11 |
2026-01-10 |
| CVE-2022-22964 |
VMware Horizon Agent for Linux (prior to 22.x) contains a local privilege escalation that allows a user to escalate to root due to a vulnerable configuration file. |
Important |
kernel |
否 |
完成修复 |
2022-04-11 |
2025-12-04 |
| CVE-2022-22962 |
VMware Horizon Agent for Linux (prior to 22.x) contains a local privilege escalation as a user is able to change the default shared folder location due to a vulnerable symbolic link. Successful exploitation can result in linking to a root owned file. |
Important |
kernel |
否 |
完成修复 |
2022-04-11 |
2025-12-04 |
| CVE-2022-29582 |
In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently. |
Important |
kernel:4.19, kernel:6.6, kernel:5.10 |
是 |
完成修复 |
2022-04-08 |
2025-12-04 |
| CVE-2021-43138 |
In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution. |
Moderate |
firefox |
否 |
完成修复 |
2022-04-07 |
2026-01-24 |
| CVE-2021-38834 |
easy-mock v1.5.0-v1.6.0 allows remote attackers to bypass the vm2 sandbox and execute arbitrary system commands through special js code. |
Important |
easymock |
否 |
完成修复 |
2022-04-05 |
2026-01-08 |
| CVE-2022-28390 |
ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free. |
Important |
kernel:4.19, kernel(ANCK)4.19, kernel:5.10, kernel |
是 |
完成修复 |
2022-04-04 |
2025-12-04 |
| CVE-2022-24785 |
Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js. |
Important |
container-tools:4.0, cockpit-composer, grafana, container-tools:2.0, cockpit-appstream, nodejs:18, container-tools:3.0, cockpit, container-tools:an8, cockpit-session-recording, grafana-pcp |
否 |
完成修复 |
2022-04-04 |
2025-12-29 |
| CVE-2021-33657 |
There is a heap overflow problem in video/SDL_pixels.c in SDL (Simple DirectMedia Layer) 2.x to 2.0.18 versions. By crafting a malicious .BMP file, an attacker can cause the application using this library to crash, denial of service or Code execution. |
Important |
SDL2 |
否 |
完成修复 |
2022-04-01 |
2026-01-04 |
| CVE-2022-21821 |
NVIDIA CUDA Toolkit SDK contains an integer overflow vulnerability in cuobjdump.To exploit this vulnerability, a remote attacker would require a local user to download a specially crafted, corrupted file and locally execute cuobjdump against the file. Such an attack may lead to remote code execution that causes complete denial of service and an impact on data confidentiality and integrity. |
Important |
kernel |
否 |
完成修复 |
2022-03-29 |
2025-12-08 |
| CVE-2021-28544 |
Apache Subversion SVN authz protected copyfrom paths regression Subversion servers reveal 'copyfrom' paths that should be hidden according to configured path-based authorization (authz) rules. When a node has been copied from a protected location, users with access to the copy can see the 'copyfrom' path of the original. This also reveals the fact that the node was copied. Only the 'copyfrom' path is revealed; not its contents. Both httpd and svnserve servers are vulnerable. |
Moderate |
subversion |
否 |
完成修复 |
2022-03-27 |
2026-01-25 |
| CVE-2022-24778 |
The imgcrypt library provides API exensions for containerd to support encrypted container images and implements the ctd-decoder command line tool for use by containerd to decrypt encrypted container images. The imgcrypt function `CheckAuthorization` is supposed to check whether the current used is authorized to access an encrypted image and prevent the user from running an image that another user previously decrypted on the same system. In versions prior to 1.1.4, a failure occurs when an image with a ManifestList is used and the architecture of the local host is not the first one in the ManifestList. Only the first architecture in the list was tested, which may not have its layers available locally since it could not be run on the host architecture. Therefore, the verdict on unavailable layers was that the image could be run anticipating that image run failure would occur later due to the layers not being available. However, this verdict to allow the image to run enabled other architectures in the ManifestList to run an image without providing keys if that image had previously been decrypted. A patch has been applied to imgcrypt 1.1.4. Workarounds may include usage of different namespaces for each remote user. |
Important |
containerd |
否 |
完成修复 |
2022-03-25 |
2026-01-04 |
| CVE-2022-0897 |
A flaw was found in the libvirt nwfilter driver. The virNWFilterObjListNumOfNWFilters method failed to acquire the driver->nwfilters mutex before iterating over virNWFilterObj instances. There was no protection to stop another thread from concurrently modifying the driver->nwfilters object. This flaw allows a malicious, unprivileged user to exploit this issue via libvirt's API virConnectNumOfNWFilters to crash the network filter management daemon (libvirtd/virtnwfilterd). |
Low |
sgabios |
否 |
完成修复 |
2022-03-25 |
2025-12-18 |
| CVE-2022-1048 |
A use-after-free flaw was found in the Linux kernel?s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system. |
Important |
kernel:4.19, kernel:6.6, kernel(ANCK)4.19, kernel:5.10 |
是 |
完成修复 |
2022-03-23 |
2025-12-04 |
| CVE-2022-27191 |
The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey. |
Moderate |
container-tools:4.0, container-tools:2.0, go-toolset:an8, runc, golist, container-tools:3.0, container-tools:an8, golang, container-tools:1.0 |
是 |
完成修复 |
2022-03-18 |
2025-12-17 |
| CVE-2022-24773 |
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not properly check `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds. |
Moderate |
dotnet3.1 |
否 |
完成修复 |
2022-03-18 |
2025-12-05 |
| CVE-2022-24772 |
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds. |
Moderate |
dotnet3.1 |
否 |
完成修复 |
2022-03-18 |
2025-12-05 |
| CVE-2022-24771 |
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds. |
Moderate |
dotnet3.1 |
否 |
完成修复 |
2022-03-18 |
2025-12-05 |
| CVE-2022-23852 |
Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES. |
Moderate |
expat |
否 |
完成修复 |
2022-03-17 |
2026-01-25 |
| CVE-2022-23308 |
valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes. |
Important |
libxml2 |
否 |
完成修复 |
2022-03-17 |
2026-01-09 |
| CVE-2022-22827 |
storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. |
Important |
expat |
否 |
完成修复 |
2022-03-17 |
2026-01-09 |
| CVE-2022-22826 |
nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. |
Important |
expat |
否 |
完成修复 |
2022-03-17 |
2026-01-09 |