{"vulnerability": "CVE-2022-3114", "sightings": [{"uuid": "26d78f0b-051e-4f03-9ce8-d38eae9e036a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3114", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12840", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3114\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in the Linux kernel through 5.16-rc6. imx_register_uart_clocks in drivers/clk/imx/clk.c lacks check of the return value of kcalloc() and will cause the null pointer dereference.\n\ud83d\udccf Published: 2022-12-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-22T13:55:33.529Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&amp;id=ed713e2bc093239ccd380c2ce8ae9e4162f5c037\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2153054", "creation_timestamp": "2025-04-22T14:03:28.000000Z"}, {"uuid": "6839e47d-4f26-4aad-bcaa-b0ab60424873", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2022-3114", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "3f7adb25-8596-4c42-8ba5-8f5bbdc6a360", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31147", "type": "published-proof-of-concept", "source": "Telegram/5Fo67vEzNv56ioLJ8OlgTOKKgKXTZTDGIuUIa4ooWyEqWlA", "content": "", "creation_timestamp": "2025-09-04T10:10:14.000000Z"}, {"uuid": "fc41facd-86e8-460b-9668-47a5f5341404", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31147", "type": "seen", "source": "https://t.me/ctinow/180588", "content": "https://ift.tt/AtwWx5m\nCVE-2022-31147 | Oracle Communications Billing and Revenue Management up to 12.0.0.8.0/15.0.0.0.0 Billing Care denial of service", "creation_timestamp": "2024-02-07T09:36:58.000000Z"}, {"uuid": "40ccbde9-cbbf-4bb6-890e-5347ec5c7ea9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31146", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13094", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-31146\n\ud83d\udd25 CVSS Score: 6.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L)\n\ud83d\udd39 Description: Wasmtime is a standalone runtime for WebAssembly. There is a bug in the Wasmtime's code generator, Cranelift, where functions using reference types may be incorrectly missing metadata required for runtime garbage collection. This means that if a GC happens at runtime then the GC pass will mistakenly think these functions do not have live references to GC'd values, reclaiming them and deallocating them. The function will then subsequently continue to use the values assuming they had not been GC'd, leading later to a use-after-free. This bug was introduced in the migration to the `regalloc2` register allocator that occurred in the Wasmtime 0.37.0 release on 2022-05-20. This bug has been patched and users should upgrade to Wasmtime version 0.38.2. Mitigations for this issue can be achieved by disabling the reference types proposal by passing `false` to `wasmtime::Config::wasm_reference_types` or downgrading to Wasmtime 0.36.0 or prior.\n\ud83d\udccf Published: 2022-07-20T22:30:16.000Z\n\ud83d\udccf Modified: 2025-04-23T17:57:59.088Z\n\ud83d\udd17 References:\n1. https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-5fhj-g3p3-pq9g\n2. https://github.com/WebAssembly/reference-types\n3. https://github.com/bytecodealliance/wasmtime/", "creation_timestamp": "2025-04-23T18:05:29.000000Z"}, {"uuid": "cef4497a-b1da-43fe-92a4-e50a223bc136", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31144", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13093", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-31144\n\ud83d\udd25 CVSS Score: 7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Redis is an in-memory database that persists on disk. A specially crafted `XAUTOCLAIM` command on a stream key in a specific state may result with heap overflow, and potentially remote code execution. This problem affects versions on the 7.x branch prior to 7.0.4. The patch is released in version 7.0.4.\n\ud83d\udccf Published: 2022-07-19T20:15:13.000Z\n\ud83d\udccf Modified: 2025-04-23T17:58:05.076Z\n\ud83d\udd17 References:\n1. https://github.com/redis/redis/security/advisories/GHSA-96f7-42fg-2jrh\n2. https://github.com/redis/redis/releases/tag/7.0.4\n3. https://security.netapp.com/advisory/ntap-20220909-0002/\n4. https://security.gentoo.org/glsa/202209-17", "creation_timestamp": "2025-04-23T18:05:28.000000Z"}, {"uuid": "c83c57d2-d9da-43ab-8cb2-cd06c2a1d0c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31148", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13104", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-31148\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Shopware is an open source e-commerce software. In versions from 5.7.0 a persistent cross site scripting (XSS) vulnerability exists in the customer module. Users are recommend to update to the current version 5.7.14. You can get the update to 5.7.14 regularly via the Auto-Updater or directly via the download overview. There are no known workarounds for this issue.\n\ud83d\udccf Published: 2022-08-01T17:10:12.000Z\n\ud83d\udccf Modified: 2025-04-23T17:56:53.899Z\n\ud83d\udd17 References:\n1. https://github.com/shopware/shopware/security/advisories/GHSA-5834-xv5q-cgfw\n2. https://github.com/shopware/shopware/commit/7875855005648fba7b39371a70816afae2e07daf\n3. https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-07-2022", "creation_timestamp": "2025-04-23T18:05:43.000000Z"}, {"uuid": "f6698ce3-0579-4355-9a67-3a0d23b06f56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31143", "type": "seen", "source": "https://t.me/cibsecurity/49786", "content": "\u203c CVE-2022-31143 \u203c\n\nGLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. It was found that in affected versions there is an exposure of private information defined in setup of GLPI (like smtp or cas hosts). Note that passwords are not exposed. Users are advised to upgrade to version 10.0.3. There are no known workarounds for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-14T22:31:36.000000Z"}, {"uuid": "52dc49a1-9332-4786-af54-ec8bbcb03219", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31140", "type": "seen", "source": "https://t.me/cibsecurity/45947", "content": "\u203c CVE-2022-31140 \u203c\n\nValinor is a PHP library that helps to map any input into a strongly-typed value object structure. Prior to version 0.12.0, Valinor can use `Throwable#getMessage()` when it should not have permission to do so. This is a problem with cases such as an SQL exception showing an SQL snippet, a database connection exception showing database IP address/username/password, or a timeout detail / out of memory detail. Attackers could use this information for potential data exfiltration, denial of service attacks, enumeration attacks, etc. Version 0.12.0 contains a patch for this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-12T00:19:37.000000Z"}, {"uuid": "27ef3ebc-4261-4e4e-92f4-c36c56ffc06c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31148", "type": "seen", "source": "https://t.me/cibsecurity/47359", "content": "\u203c CVE-2022-31148 \u203c\n\nShopware is an open source e-commerce software. In versions from 5.7.0 a persistent cross site scripting (XSS) vulnerability exists in the customer module. Users are recommend to update to the current version 5.7.14. You can get the update to 5.7.14 regularly via the Auto-Updater or directly via the download overview. There are no known workarounds for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-01T20:17:01.000000Z"}, {"uuid": "f43c7dc8-1a29-4fbf-a8e0-8c8dab4eef43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31146", "type": "seen", "source": "https://t.me/cibsecurity/46723", "content": "\u203c CVE-2022-31146 \u203c\n\nThere is a bug in the Wasmtime's code generator, Cranelift, where functions using reference types may be incorrectly missing metadata required for runtime garbage collection. This means that if a GC happens at runtime then the GC pass will mistakenly think these functions do not have live references to GC'd values, reclaiming them and deallocating them. The function will then subsequently continue to use the values assuming they had not been GC'd, leading later to a use-after-free. This bug was introduced in the migration to the `regalloc2` register allocator that occurred in the Wasmtime 0.37.0 release on 2022-05-20. This bug has been patched and users should upgrade to Wasmtime version 0.38.2. Mitigations for this issue can be achieved by doing one of: * Disabling the reference types proposal by passing `false` to [`wasmtime::Config::wasm_reference_types`](https://docs.rs/wasmtime/0.38.0/wasmtime/struct.Config.html#method.wasm_reference_types). * Downgrading to Wasmtime 0.36.0 or prior.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-21T07:12:38.000000Z"}, {"uuid": "a11edab2-1465-4257-a9d5-8d6d23c3ad0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31142", "type": "seen", "source": "https://t.me/cibsecurity/46271", "content": "\u203c CVE-2022-31142 \u203c\n\n@fastify/bearer-auth is a Fastify plugin to require bearer Authorization headers. @fastify/bearer-auth prior to versions 7.0.2 and 8.0.1 does not securely use crypto.timingSafeEqual. A malicious attacker could estimate the length of one valid bearer token. According to the corresponding RFC 6750, the bearer token has only base64 valid characters, reducing the range of characters for a brute force attack. Version 7.0.2 and 8.0.1 of @fastify/bearer-auth contain a patch. There are currently no known workarounds. The package fastify-bearer-auth, which covers versions 6.0.3 and prior, is also vulnerable starting at version 5.0.1. Users of fastify-bearer-auth should upgrade to a patched version of @fastify/bearer-auth.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-17T16:01:49.000000Z"}, {"uuid": "f36e30e2-01af-47ea-a2fa-6d0b2fe90d84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31144", "type": "seen", "source": "https://t.me/cibsecurity/46594", "content": "\u203c CVE-2022-31144 \u203c\n\nRedis is an in-memory database that persists on disk. A specially crafted `XAUTOCLAIM` command on a stream key in a specific state may result with heap overflow, and potentially remote code execution. This problem affects versions on the 7.x branch prior to 7.0.4. The patch is released in version 7.0.4.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-20T00:41:09.000000Z"}, {"uuid": "178423ad-0afb-4bff-82ef-f0d15f994597", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31145", "type": "seen", "source": "https://t.me/cibsecurity/46208", "content": "\u203c CVE-2022-31145 \u203c\n\nFlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. In versions 1.1.30 and prior, authenticated users using an external identity provider can continue to use Access Tokens and ID Tokens even after they expire. Users who use FlyteAdmin as the OAuth2 Authorization Server are unaffected by this issue. A patch is available on the `master` branch of the repository. As a workaround, rotating signing keys immediately will invalidate all open sessions and force all users to attempt to obtain new tokens. Those who use this workaround should continue to rotate keys until FlyteAdmin has been upgraded and hide FlyteAdmin deployment ingress URL from the internet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-14T00:40:05.000000Z"}]}