Linux Vulnerabilities

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Type

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Product

Linux Kernel2804
Linux Foundation Xen122
Linux Foundation ONOS8
Linux Foundation cups-filters5
Linux Foundation xen5

Grouping vulnerabilities by products helps to get an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Remediation

Official Fix2485
Temporary Fix0
Workaround16
Unavailable13
Not Defined466

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

High20
Functional3
Proof-of-Concept517
Unproven229
Not Defined2211

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Access Vector

Not Defined0
Physical42
Local1804
Adjacent312
Network822

The approach a vulnerability it becomes important to use the expected access vector. This is typically via the network, local, or physically even.

Authentication

Not Defined0
High36
Low1168
None1776

To exploit a vulnerability a certail level of authentication might be required. Vulnerabilities without such a requirement are much more popular.

User Interaction

Not Defined0
Required63
None2917

Some attack scenarios require some user interaction by a victim. This is typical for phishing, social engineering and cross site scripting attacks.

C3BM Index

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

CVSSv3 Base

≤10
≤20
≤320
≤4409
≤5340
≤6653
≤7828
≤8389
≤9219
≤10122

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤337
≤4424
≤5442
≤6897
≤7592
≤8337
≤9195
≤1056

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB

≤10
≤20
≤352
≤4594
≤5184
≤6836
≤7560
≤8413
≤9187
≤10154

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD

≤10
≤20
≤37
≤421
≤5113
≤6364
≤7142
≤8434
≤921
≤1049

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

CNA

≤10
≤20
≤30
≤40
≤52
≤60
≤78
≤84
≤90
≤101

A CVE Numbering Authority (CNA) is responsible for assigning new CVE entries. They might also include a CVSS score. These are usually not complete and might differ from VulDB scores.

Vendor

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research

≤10
≤20
≤30
≤40
≤50
≤61
≤70
≤80
≤90
≤100

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

Exploit 0-day

<1k25
<2k148
<5k650
<10k1164
<25k803
<50k185
<100k4
≥100k1

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today

<1k2049
<2k153
<5k429
<10k214
<25k135
<50k0
<100k0
≥100k0

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Exploit Market Volume

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

🔴 CTI Activities

Our unique Cyber Threat Intelligence aims to determine the ongoing research of actors to anticipiate their acitivities. Observing exploit markets on the Darknet, discussions of vulnerabilities on mailinglists, and exchanges on social media makes it possible to identify planned attacks. Monitored actors and activities are classified whether they are offensive or defensive. They are also weighted as some actors are well-known for certain products and technologies. And some of their disclosures might contain more or less details about technical aspects and personal context. The world map highlights active actors in real-time.

Affected Products (30): Board-TNK (1), CPU (1), DeepOfix (1), Enterprise Server (1), Heartbeat (2), Kernel (2804), LibThai (1), MySQL (1), MySQLDatabase Admin Tool (1), News-TNK (1), Nslookup (1), OCF Resource Agents (1), ONOS (8), ONOS SDN Controller (1), Sblim-sfcb (2), Traceroute Script (1), UMIP (2), XEN (1), Xen (122), Xen Elf Parser (3), cups-filters (5), foomatic (1), heartbeat (2), libvchan (1), nfs-utils (3), php Download Manager (1), php User Base (1), sblim-sfcb (4), xen (5), zephyr (1)

Link to Vendor Website: https://www.kernel.org/

PublishedBaseTempVulnerabilityProdExpRemCTIEPSSCVE
09/28/20224.94.7Linux Kernel Sound Subsystem null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.610.00885CVE-2022-3303
09/27/20225.55.3Linux Kernel io_uring Module off-by-oneOperating SystemNot DefinedOfficial Fix0.880.00885CVE-2022-3103
09/23/20227.06.8Linux Kernel BPF bpf_sys_bpf out-of-boundsOperating SystemNot DefinedOfficial Fix0.070.00885CVE-2022-2785
09/21/20226.36.0Linux Kernel TLB mremap.c use after freeOperating SystemNot DefinedOfficial Fix0.110.00950CVE-2022-41222
09/21/20225.04.8Linux Kernel dmxdev.c dvb_dmxdev_release use after freeOperating SystemNot DefinedOfficial Fix0.040.00950CVE-2022-41218
09/20/20227.57.2Linux Kernel video4linux Driver em28xx_usb_probe use after freeOperating SystemNot DefinedOfficial Fix0.110.00885CVE-2022-3239
09/18/20224.34.1Linux Kernel stex.c stex_queuecommand_lck information disclosureOperating SystemNot DefinedOfficial Fix0.070.00950CVE-2022-40768
09/16/20226.36.3Linux Kernel vmwgfx Driver vmxgfx_execbuf.c range errorOperating SystemNot DefinedNot Defined0.070.00885CVE-2022-36402
09/16/20228.38.1Linux Kernel Notification binder_poll use after freeOperating SystemNot DefinedOfficial Fix0.350.00885CVE-2022-3176
09/15/20227.57.2Linux Kernel TPM Device use after freeOperating SystemNot DefinedOfficial Fix0.040.00885CVE-2022-2977
09/15/20226.56.2Linux Kernel io_uring.c null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.140.00890CVE-2022-40476
09/14/20227.16.8Linux Kernel Journaled File System inode.c diFree null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.070.00885CVE-2022-3202
09/13/20224.34.1Linux Kernel Sound Subsystem ioctl out-of-boundsOperating SystemNot DefinedOfficial Fix0.040.00885CVE-2022-3170
09/09/20226.46.4Linux Kernel vmwgfx Driver vmxgfx_execbuf.c vmw_execbuf_tie_context use after freeOperating SystemNot DefinedNot Defined0.070.00885CVE-2022-40133
09/09/20226.46.4Linux Kernel vmwgfx Driver vmxgfx_execbuf.c vmw_cmd_res_check use after freeOperating SystemNot DefinedNot Defined0.040.00885CVE-2022-38457
09/09/20226.46.4Linux Kernel vmwgfx Driver vmxgfx_execbuf.c null pointer dereferenceOperating SystemNot DefinedNot Defined0.070.00885CVE-2022-38096
09/09/20226.46.4Linux Kernel vmwgfx Driver vmxgfx_kms.c buffer overflowOperating SystemNot DefinedNot Defined0.070.00885CVE-2022-36280
09/09/20225.55.3Linux Kernel Intel iSMT SMBus Host Controller Driver ismt_access buffer overflowOperating SystemNot DefinedOfficial Fix0.040.00885CVE-2022-3077
09/09/20223.33.2Linux Kernel BPF Subsystem bpf_tail_call out-of-boundsOperating SystemNot DefinedOfficial Fix0.000.00885CVE-2022-2905
09/09/20225.55.3Linux Kernel ASIX AX88179_178A Device Driver ax88179_rx_fixup memory corruptionOperating SystemNot DefinedOfficial Fix0.040.00885CVE-2022-2964
09/09/20223.53.4Linux Kernel Device nvme_dev_ioctl denial of serviceOperating SystemNot DefinedOfficial Fix0.070.00885CVE-2022-3169
09/09/20224.64.4Linux Kernel capsule-loader.c use after freeOperating SystemNot DefinedOfficial Fix0.040.00885CVE-2022-40307
09/05/20225.55.3Linux Kernel pxa3xx-gcu.c pxa3xx_gcu_write integer overflowOperating SystemNot DefinedOfficial Fix0.700.00885CVE-2022-39842
09/02/20224.64.4Linux Kernel Device Driver tlb.h unmap_mapping_range race conditionOperating SystemNot DefinedOfficial Fix0.070.00950CVE-2022-39188
09/02/20225.55.3Linux Kernel x86 KVM Subsystem Privilege EscalationOperating SystemNot DefinedOfficial Fix0.040.00950CVE-2022-39189
09/02/20227.57.2Linux Kernel nf_tables_api.c nft_verdict_init denial of serviceOperating SystemNot DefinedOfficial Fix0.040.00950CVE-2022-39190
09/02/20226.36.0Linux Kernel openvswitch Module reserve_sfa_size out-of-bounds writeOperating SystemNot DefinedOfficial Fix0.040.00885CVE-2022-2639
09/02/20226.36.1Linux Kernel VDUSE Kernel Driver vduse_vdpa_get_config uninitialized variableOperating SystemNot DefinedNot Defined0.040.00885CVE-2022-2308
09/02/20227.37.0Linux Kernel Netfilter nf_conntrack_irc.c nf_conntrack_irc unknown vulnerabilityOperating SystemNot DefinedOfficial Fix0.040.00885CVE-2022-2663
09/02/20223.53.4Linux Kernel vidtv_s302m.c vzalloc null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.030.00885CVE-2022-3078
09/02/20225.04.8Linux Kernel core.c perf_event_open race conditionOperating SystemNot DefinedOfficial Fix0.030.01005CVE-2022-1729
09/01/20227.57.2Linux Kernel i740 Driver ioctl divide by zeroOperating SystemNot DefinedOfficial Fix0.040.00885CVE-2022-3061
09/01/20224.34.1Linux Kernel printer_ioctl use after freeOperating SystemNot DefinedOfficial Fix0.050.00885CVE-2020-27784
09/01/20225.55.3Linux Kernel KVM kvm_main.c kvm_vcpu_init null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.090.00950CVE-2022-1263
08/31/20226.36.0Linux Kernel IP Framework af_key.c pfkey_register out-of-bounds writeOperating SystemNot DefinedOfficial Fix0.030.00950CVE-2022-3028
08/31/20226.36.0Linux Kernel Memory Subsystem gup.c race conditionOperating SystemNot DefinedOfficial Fix0.040.00885CVE-2022-2590
08/31/20226.56.2Linux Kernel KVM lapic.c kvm_irq_delivery_to_apic_fast null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.070.00950CVE-2022-2153
08/31/20226.36.0Linux Kernel io-uring io_uring.c use after freeOperating SystemNot DefinedOfficial Fix0.040.00885CVE-2022-1976
08/31/20226.35.8Linux Kernel NFC core.c use after freeOperating SystemNot DefinedOfficial Fix0.030.00885CVE-2022-1974
08/31/20224.34.1Linux Kernel io_uring Module io_uring.c io_read out-of-boundsOperating SystemNot DefinedOfficial Fix0.070.00950CVE-2022-1508
08/31/20226.56.2Linux Kernel Amateur Radio AX.25 af_ax25.c ax25_release use after freeOperating SystemNot DefinedOfficial Fix0.040.00950CVE-2022-1205
08/31/20226.56.2Linux Kernel NFC netlink.c nfc_genl_fw_download_done uncaught exceptionOperating SystemNot DefinedOfficial Fix0.060.00885CVE-2022-1975
08/31/20224.64.6Linux Kernel Rose Driver rose_connect race conditionOperating SystemProof-of-ConceptNot Defined0.040.00885CVE-2022-1247
08/30/20225.65.4Linux Kernel net_rds_alloc_sgs denial of serviceOperating SystemNot DefinedOfficial Fix0.040.00885CVE-2022-21385
08/29/20228.88.5Linux Kernel PLP Rose rose_bind use after freeOperating SystemNot DefinedNot Defined0.070.00885CVE-2022-2961
08/29/20226.56.5Linux Kernel Amateur Radio AX.25 use after freeOperating SystemNot DefinedNot Defined0.030.00950CVE-2022-1204
08/29/20226.56.5Linux Kernel EXT4 Filesystem namei.c dx_insert_block use after freeOperating SystemNot DefinedNot Defined0.110.00890CVE-2022-1184
08/29/20228.88.4Linux Kernel io_uring Subsystem io_uring.c io_register_personality use after freeOperating SystemNot DefinedOfficial Fix0.000.00950CVE-2022-1043
08/29/20224.34.3Linux Kernel nf_tables_core.c nft_do_chain uninitialized pointerOperating SystemNot DefinedNot Defined0.030.01669CVE-2022-1016
08/29/20226.56.2Linux Kernel Amateur Radio use after freeOperating SystemNot DefinedOfficial Fix0.040.01108CVE-2022-1199

2930 more entries are not shown

Might our Artificial Intelligence support you?

Check our Alexa App!