This shows you the differences between two versions of the page.
mailing-lists:distros:stats:2022 [2022/08/31 20:54] aliguori created |
mailing-lists:distros:stats:2022 [2023/11/06 17:45] (current) solar update page heading, reduce indentation level of page content |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ==== Data ==== | + | ====== Distros list data for 2022 ====== |
- | ^Project^Subject^Reported^Public^Time of oss-security posting^CVE(s)^Days embargoed (scheduled)^Days embargoed (oss-security)^ | + | |
+ | The data here is unfortunately incomplete and unreliable, resulting from automated processing of input that wasn't meant to be fully machine-readable. | ||
+ | |||
+ | ^Project^Subject^Reported^Coordinated Release Date^Time of oss-security posting^CVE(s)^Days embargoed (scheduled)^Days embargoed (oss-security)^ | ||
+ | ^ December ^^^^^^^^ | ||
+ | | |Re: Preview of X.Org Security Advisory for 2022-12-14|2022-12-05T23:28:51+00:00|2022-12-12T23:28:51+00:00|[[https://marc.info/?i=e7573ba8-846b-b91a-5655-e4f5db2cdf88%40redhat.com|2022-12-14T01:23:51+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-4283|CVE-2022-4283]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-46283|CVE-2022-46283]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-46340|CVE-2022-46340]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-46341|CVE-2022-46341]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-46342|CVE-2022-46342]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-46343|CVE-2022-46343]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-46344|CVE-2022-46344]]|7.00|8.04| | ||
+ | ^ November ^^^^^^^^ | ||
+ | | |rxvt-unicode RCE|2022-11-28T00:51:42+00:00|2022-12-05T00:51:42+00:00|[[https://marc.info/?i=CAP9KPhDh6PJu-0mD12wYUraf1Ya1MSUPwz1PsPO5omi39-OYLw%40mail.gmail.com|2022-12-05T11:22:33+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-4170|CVE-2022-4170]]|7.00|7.42| | ||
+ | | |Re: Security sensitive bug in the i915 kernel driver|2022-11-23T15:31:14+00:00|2022-11-30T15:31:14+00:00|[[https://marc.info/?i=c9089e54-bc0d-773c-233e-d63980ad49d4%40intel.com|2022-11-30T10:22:16+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-0330|CVE-2022-0330]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-4139|CVE-2022-4139]]|7.00|6.75| | ||
+ | | |Fwd: [Security]Use after free in staging|2022-11-16T17:16:46+00:00|2022-11-23T17:16:46+00:00|[[https://marc.info/?i=CAJedcCyz-uNq%2BtyK%2BBqG0xCD9_WOOC8nta77Up7gaOBs%2BpfwyA%40mail.gmail.com|2022-11-18T03:58:55+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2015-0571|CVE-2015-0571]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2021-28660|CVE-2021-28660]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-4095|CVE-2022-4095]]|7.00|1.42| | ||
+ | ^ October ^^^^^^^^ | ||
+ | | |Upcoming Git security fix release|2022-10-12T17:47:38+00:00|2022-10-19T17:47:38+00:00|[[https://marc.info/?i=Y07hdTCQHoSZjN2Q%40nand.local|2022-10-18T17:25:09+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-39253|CVE-2022-39253]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-39260|CVE-2022-39260]]|7.00|5.96| | ||
+ | | |Re: CVE-2022-2602 - Linux kernel UAF|2022-10-11T14:38:03+00:00|2022-10-18T14:38:03+00:00|[[https://marc.info/?i=Y07bhw5Um02VYKvl%40quatroqueijos.cascardo.eti.br|2022-10-18T16:59:51+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-2602|CVE-2022-2602]]|7.00|7.08| | ||
+ | | |...|2022-10-03T16:57:49+00:00|2022-10-10T16:57:49+00:00|[[https://marc.info/?i=c1168996-ea72-ad04-027f-2f3b190eabd5%40isc.org|2022-10-05T16:29:06+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-2928|CVE-2022-2928]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-2929|CVE-2022-2929]]|7.00|1.96| | ||
+ | ^ September ^^^^^^^^ | ||
+ | | |...|2022-09-20T06:51:45+00:00|2022-09-27T06:51:45+00:00|[[https://marc.info/?i=YyrddDfDHLntRmJk%40larwa.hq.kempniu.pl|2022-09-21T09:46:28+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-2795|CVE-2022-2795]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-2881|CVE-2022-2881]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-2906|CVE-2022-2906]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-3080|CVE-2022-3080]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-38177|CVE-2022-38177]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-38178|CVE-2022-38178]]|7.00|1.08| | ||
^ August ^^^^^^^^ | ^ August ^^^^^^^^ | ||
- | |[[https://dpdk.org|DPDK]]|CVE-2022-2132 public disclosure date notice [vs-plain]|2022-08-25T08:44:16+00:00|2022-09-01T08:44:16+00:00|[[https://marc.info/?i=1705193.jNaZZp9DzI%40thomas|2022-08-29T18:12:18+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-2132|CVE-2022-2132]]|7.00|4.38| | + | | |[report 2/?] Report vmalloc UAF in dvb-core/dmxdev|2022-08-29T15:58:58+00:00|2022-09-05T15:58:58+00:00|[[https://marc.info/?i=20220923190601.GA364453%40ubuntu|2022-09-23T19:06:01+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-41218|CVE-2022-41218]]|7.00|25.12| |
- | |[[https://github.com/vmware/open-vm-tools|open-vm-tools]]|[SECURITY EMBARGOED] CVE-2022-31676: Local privilege escalation vulnerability in open-vm-tools|2022-08-11T15:33:18+00:00|2022-08-18T15:33:18+00:00|[[https://marc.info/?i=BYAPR05MB63436604DE6E9F49EAAAD1B1B9709%40BYAPR05MB6343.namprd05.prod.outlook.com|2022-08-23T20:10:48+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-31676|CVE-2022-31676]]|7.00|12.17| | + | |[[https://github.com/ClusterLabs/pcs|pcs]]|PCS Security Issue|2022-08-25T14:44:38+00:00|2022-09-01T14:00:00+00:00|[[https://marc.info/?i=CAFqpC6zUc9DYKnBv3OBAsjOE9bgfGVqvoCW3B3f%3DCY43WfDVQA%40mail.gmail.com|2022-09-01T14:00:58+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-2735|CVE-2022-2735]]|6.96|6.96| |
+ | |[[https://dpdk.org|DPDK]]|CVE-2022-2132 public disclosure date notice [vs-plain]|2022-08-25T08:44:16+00:00|2022-08-29T15:00:00+00:00|[[https://marc.info/?i=1705193.jNaZZp9DzI%40thomas|2022-08-29T18:12:18+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-2132|CVE-2022-2132]]|4.25|4.38| | ||
+ | |[[https://curl.se|curl]]|curl: control code in cookie denial of service|2022-08-22T06:45:35+00:00|2022-08-31T23:59:58+00:00|[[https://marc.info/?i=8r186sn8-2orp-3n38-nno4-9o8n23n6s069%40unkk.fr|2022-08-31T06:31:44+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-35252|CVE-2022-35252]]|9.71|8.96| | ||
+ | |[[https://github.com/vmware/open-vm-tools|open-vm-tools]]|[SECURITY EMBARGOED] CVE-2022-31676: Local privilege escalation vulnerability in open-vm-tools|2022-08-11T15:33:18+00:00|2022-08-23T23:59:59+00:00|[[https://marc.info/?i=BYAPR05MB63436604DE6E9F49EAAAD1B1B9709%40BYAPR05MB6343.namprd05.prod.outlook.com|2022-08-23T20:10:48+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-31676|CVE-2022-31676]]|12.33|12.17| | ||
|[[https://kernel.org|Linux]]|Linux NAT issue|2022-08-03T01:55:09+00:00|2022-08-10T01:55:09+00:00|[[https://marc.info/?i=CAP9KPhDskZ1W_wnJ_Z8sNY9nqwLGyL0k3pjYwrhJ_TQnXcC-HA%40mail.gmail.com|2022-08-30T02:27:44+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-2663|CVE-2022-2663]]|7.00|27.00| | |[[https://kernel.org|Linux]]|Linux NAT issue|2022-08-03T01:55:09+00:00|2022-08-10T01:55:09+00:00|[[https://marc.info/?i=CAP9KPhDskZ1W_wnJ_Z8sNY9nqwLGyL0k3pjYwrhJ_TQnXcC-HA%40mail.gmail.com|2022-08-30T02:27:44+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-2663|CVE-2022-2663]]|7.00|27.00| | ||
- | |[[https://kernel.org|Linux]]|Re: CVE-2022-2586|2022-08-03T00:23:10+00:00|2022-08-10T00:23:10+00:00|[[https://marc.info/?i=YvKVC%2FO%2BtGfNNm35%40quatroqueijos|2022-08-09T17:10:35+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-2586|CVE-2022-2586]]|7.00|6.67| | + | |[[https://kernel.org|Linux]]|Re: CVE-2022-2586|2022-08-03T00:23:10+00:00|2022-08-09T17:00:00+00:00|[[https://marc.info/?i=YvKVC%2FO%2BtGfNNm35%40quatroqueijos|2022-08-09T17:10:35+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-2586|CVE-2022-2586]]|6.67|6.67| |
- | |[[https://kernel.org|Linux]]|CVE-2022-2585|2022-08-03T00:15:25+00:00|2022-08-10T00:15:25+00:00|[[https://marc.info/?i=YvKVxLtBs86r6Dmh%40quatroqueijos|2022-08-09T17:13:40+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-2585|CVE-2022-2585]]|7.00|6.67| | + | |[[https://kernel.org|Linux]]|CVE-2022-2585|2022-08-03T00:15:25+00:00|2022-08-09T17:00:00+00:00|[[https://marc.info/?i=YvKVxLtBs86r6Dmh%40quatroqueijos|2022-08-09T17:13:40+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-2585|CVE-2022-2585]]|6.67|6.67| |
- | |[[https://kernel.org|Linux]]|class_route UAF report (was Re: CVE-2022-2588)|2022-08-02T19:58:24+00:00|2022-08-09T19:58:24+00:00|[[https://marc.info/?i=YvKVWuPyQ%2FYXBT%2Bo%40quatroqueijos|2022-08-09T17:11:54+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2011-1019|CVE-2011-1019]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-2588|CVE-2022-2588]]|7.00|6.88| | + | |[[https://kernel.org|Linux]]|class_route UAF report (was Re: CVE-2022-2588)|2022-08-02T19:58:24+00:00|2022-08-09T17:00:00+00:00|[[https://marc.info/?i=YvKVWuPyQ%2FYXBT%2Bo%40quatroqueijos|2022-08-09T17:11:54+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2011-1019|CVE-2011-1019]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-2588|CVE-2022-2588]]|6.88|6.88| |
^ July ^^^^^^^^ | ^ July ^^^^^^^^ | ||
|[[https://kernel.org|Linux]]|Re: ...|2022-07-31T18:16:32+00:00|2022-08-07T18:16:32+00:00|[[https://marc.info/?i=1973d16e-bb3e-c5b2-74e0-cc2faf9db2bd%40redhat.com|2022-08-08T07:18:27+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2016-5195|CVE-2016-5195]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-2590|CVE-2022-2590]]|7.00|7.54| | |[[https://kernel.org|Linux]]|Re: ...|2022-07-31T18:16:32+00:00|2022-08-07T18:16:32+00:00|[[https://marc.info/?i=1973d16e-bb3e-c5b2-74e0-cc2faf9db2bd%40redhat.com|2022-08-08T07:18:27+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2016-5195|CVE-2016-5195]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-2590|CVE-2022-2590]]|7.00|7.54| | ||
Line 29: | Line 47: | ||
|[[https://github.com/logrotate/logrotate|logrotate]]|Re: ...|2022-05-25T13:19:31+00:00|2022-06-01T13:19:31+00:00|[[https://marc.info/?i=c41c3628-6132-9893-55ce-d86ff251e4fd%40canonical.com|2022-05-25T13:37:24+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-1348|CVE-2022-1348]]|7.00|0.00| | |[[https://github.com/logrotate/logrotate|logrotate]]|Re: ...|2022-05-25T13:19:31+00:00|2022-06-01T13:19:31+00:00|[[https://marc.info/?i=c41c3628-6132-9893-55ce-d86ff251e4fd%40canonical.com|2022-05-25T13:37:24+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-1348|CVE-2022-1348]]|7.00|0.00| | ||
^ March ^^^^^^^^ | ^ March ^^^^^^^^ | ||
- | |[[https://kernel.org|Linux]]|Vulnerability in nf_tables can cause privilege escalation|2022-03-17T02:08:11+00:00|2022-03-24T02:08:11+00:00|[[https://marc.info/?i=20220825132856.GA29197%40openwall.com|2022-08-25T13:28:56+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-1015|CVE-2022-1015]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-1016|CVE-2022-1016]]|7.00|161.46| | + | |[[https://kernel.org|Linux]]|Vulnerability in nf_tables can cause privilege escalation|2022-03-17T02:08:11+00:00|2022-03-24T02:08:11+00:00|[[https://marc.info/?i=20220825132856.GA29197%40openwall.com|2022-08-25T13:28:56+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-1015|CVE-2022-1015]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-1016|CVE-2022-1016]]|7.00|161.46((This is not for real - a much later follow-up oss-security posting was wrongly picked up when automatically generating this data, whereas the original was apparently on March 28))| |
- | |[[https://kernel.org|Linux]]|CVE-2022-0847: overwriting read-only files on Linux|2022-03-07T12:01:19+00:00|2022-03-14T12:01:19+00:00|[[https://marc.info/?i=1973d16e-bb3e-c5b2-74e0-cc2faf9db2bd%40redhat.com|2022-08-08T07:18:27+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2016-5195|CVE-2016-5195]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-0847|CVE-2022-0847]]|7.00|153.79| | + | |[[https://kernel.org|Linux]]|CVE-2022-0847: overwriting read-only files on Linux|2022-03-07T12:01:19+00:00|2022-03-14T12:01:19+00:00|[[https://marc.info/?i=1973d16e-bb3e-c5b2-74e0-cc2faf9db2bd%40redhat.com|2022-08-08T07:18:27+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2016-5195|CVE-2016-5195]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-0847|CVE-2022-0847]]|7.00|153.79((This is not for real - a much earlier linux-distros posting was wrongly picked up when automatically generating this data))| |
^ February ^^^^^^^^ | ^ February ^^^^^^^^ | ||
|[[https://kernel.org|Linux]]|Vulnerability in Linux kernels until 5.6.11|2022-02-28T08:20:32+00:00|2022-03-07T08:20:32+00:00|[[https://marc.info/?i=CAKPOu%2B8WtknWoUeY-CTK5ejo0hOQDsPOsbO12pFK6ifJwmVo4Q%40mail.gmail.com|2022-03-07T12:01:19+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-0847|CVE-2022-0847]]|7.00|7.12| | |[[https://kernel.org|Linux]]|Vulnerability in Linux kernels until 5.6.11|2022-02-28T08:20:32+00:00|2022-03-07T08:20:32+00:00|[[https://marc.info/?i=CAKPOu%2B8WtknWoUeY-CTK5ejo0hOQDsPOsbO12pFK6ifJwmVo4Q%40mail.gmail.com|2022-03-07T12:01:19+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-0847|CVE-2022-0847]]|7.00|7.12| | ||
^ January ^^^^^^^^ | ^ January ^^^^^^^^ | ||
- | | |Re: Vulnerability in the vmwgfx driver|2022-01-21T12:07:12+00:00|2022-01-28T12:07:12+00:00|[[https://marc.info/?i=0f115734-5e21-8fa9-7e96-f8636788a0bc%40grsecurity.net|2022-01-27T20:00:19+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-22942|CVE-2022-22942]]|7.00|6.29| | + | |[[https://kernel.org|Linux]]|Re: Vulnerability in the vmwgfx driver|2022-01-21T12:07:12+00:00|2022-01-28T12:07:12+00:00|[[https://marc.info/?i=0f115734-5e21-8fa9-7e96-f8636788a0bc%40grsecurity.net|2022-01-27T20:00:19+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-22942|CVE-2022-22942]]|7.00|6.29| |
- | | |Re: Security sensitive bug in the i915 kernel driver|2022-01-18T14:32:16+00:00|2022-01-25T14:32:16+00:00|[[https://marc.info/?i=7460e2a7-4323-3914-bcd6-1d07c859abe5%40linux.intel.com|2022-01-25T17:55:25+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-0330|CVE-2022-0330]]|7.00|7.12| | + | |[[https://kernel.org|Linux]]|Re: Security sensitive bug in the i915 kernel driver|2022-01-18T14:32:16+00:00|2022-01-25T14:32:16+00:00|[[https://marc.info/?i=7460e2a7-4323-3914-bcd6-1d07c859abe5%40linux.intel.com|2022-01-25T17:55:25+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-0330|CVE-2022-0330]]|7.00|7.12| |
- | | |Re: CVE-2022-21658: TOCTOU in Rust's std::fs::remove_dir_all|2022-01-17T11:29:52+00:00|2022-01-24T11:29:52+00:00|[[https://marc.info/?i=7a65d359-c698-a308-e6e8-3c0c44cff037%40pietroalbini.org|2022-01-20T11:02:55+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2021-3997|CVE-2021-3997]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-21658|CVE-2022-21658]]|7.00|2.96| | + | |[[https://www.rust-lang.org/|rust]]|Re: CVE-2022-21658: TOCTOU in Rust's std::fs::remove_dir_all|2022-01-17T11:29:52+00:00|2022-01-24T11:29:52+00:00|[[https://marc.info/?i=7a65d359-c698-a308-e6e8-3c0c44cff037%40pietroalbini.org|2022-01-20T11:02:55+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2021-3997|CVE-2021-3997]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-21658|CVE-2022-21658]]|7.00|2.96| |
- | | |Re: ***UNCHECKED*** CVE-2021-45417 - aide: heap-based buffer overflow vulnerability in base64 functions|2022-01-16T13:00:34+00:00|2022-01-23T13:00:34+00:00|[[https://marc.info/?i=YemPSkQtnUCflmaH%40sulfur.vonhaugwitz.com|2022-01-20T16:35:22+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2021-45417|CVE-2021-45417]]|7.00|4.12| | + | |[[https://aide.github.io/|aide]]|Re: ***UNCHECKED*** CVE-2021-45417 - aide: heap-based buffer overflow vulnerability in base64 functions|2022-01-16T13:00:34+00:00|2022-01-23T13:00:34+00:00|[[https://marc.info/?i=YemPSkQtnUCflmaH%40sulfur.vonhaugwitz.com|2022-01-20T16:35:22+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2021-45417|CVE-2021-45417]]|7.00|4.12| |
- | | |usbview polkit policy local root exploit (CVE-2022-23220)|2022-01-13T13:30:52+00:00|2022-01-20T13:30:52+00:00|[[https://marc.info/?i=YerETqS%2BHCN4qz%2FZ%40f195.suse.de|2022-01-21T14:33:50+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-23220|CVE-2022-23220]]|7.00|8.04| | + | |[[https://github.com/gregkh/usbview|usbview]]|usbview polkit policy local root exploit (CVE-2022-23220)|2022-01-13T13:30:52+00:00|2022-01-20T13:30:52+00:00|[[https://marc.info/?i=YerETqS%2BHCN4qz%2FZ%40f195.suse.de|2022-01-21T14:33:50+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-23220|CVE-2022-23220]]|7.00|8.04| |
- | | |Re: Prosody XMPP Server 0.11.x Unauthenticated Remote Denial of Service / Resource Exhaustion|2022-01-12T07:58:16+00:00|2022-01-19T07:58:16+00:00|[[https://marc.info/?i=2193597.LkMCQtBBq3%40sinistra|2022-01-13T17:07:44+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-0217|CVE-2022-0217]]|7.00|1.38| | + | |[[https://prosody.im/|prosody]]|Re: Prosody XMPP Server 0.11.x Unauthenticated Remote Denial of Service / Resource Exhaustion|2022-01-12T07:58:16+00:00|2022-01-19T07:58:16+00:00|[[https://marc.info/?i=2193597.LkMCQtBBq3%40sinistra|2022-01-13T17:07:44+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-0217|CVE-2022-0217]]|7.00|1.38| |
- | | |Re: CVE-2021-4034 (patch)|2022-01-12T00:01:39+00:00|2022-01-19T00:01:39+00:00|[[https://marc.info/?i=F9283FD4-A0FC-4944-8659-530684BB33F8%40gentoo.org|2022-01-25T18:04:49+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2021-4034|CVE-2021-4034]]|7.00|13.75| | + | |[[https://gitlab.freedesktop.org/polkit/polkit|polkit]]|Re: CVE-2021-4034 (patch)|2022-01-12T00:01:39+00:00|2022-01-19T00:01:39+00:00|[[https://marc.info/?i=F9283FD4-A0FC-4944-8659-530684BB33F8%40gentoo.org|2022-01-25T18:04:49+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2021-4034|CVE-2021-4034]]|7.00|13.75| |
- | | |Out-of-bounds write of heap buffer in fs_context.c leads to LPE and container escape|2022-01-11T09:01:05+00:00|2022-01-18T09:01:05+00:00|[[https://marc.info/?i=215FEA11-77C7-42C1-97AB-8B3F637F9C61%40oracle.com|2022-01-18T18:57:57+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-0185|CVE-2022-0185]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-0216|CVE-2022-0216]]|7.00|7.38| | + | |[[https://kernel.org|Linux]]|Out-of-bounds write of heap buffer in fs_context.c leads to LPE and container escape|2022-01-11T09:01:05+00:00|2022-01-18T09:01:05+00:00|[[https://marc.info/?i=215FEA11-77C7-42C1-97AB-8B3F637F9C61%40oracle.com|2022-01-18T18:57:57+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2022-0185|CVE-2022-0185]]\\ [[https://nvd.nist.gov/vuln/detail/CVE-2022-0216|CVE-2022-0216]]|7.00|7.38| |
- | | |Re: LUKS2 / cryptsetup: CVE-2021-4122 disabling encryption via header rewrite|2022-01-07T10:15:50+00:00|2022-01-14T10:15:50+00:00|[[https://marc.info/?i=49e8cc07-ff0d-5cd1-ff2e-eee36bf7e46c%40gmail.com|2022-01-13T10:10:00+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2021-4122|CVE-2021-4122]]|7.00|5.96| | + | |[[https://gitlab.com/cryptsetup/cryptsetup|cryptsetup]]|Re: LUKS2 / cryptsetup: CVE-2021-4122 disabling encryption via header rewrite|2022-01-07T10:15:50+00:00|2022-01-14T10:15:50+00:00|[[https://marc.info/?i=49e8cc07-ff0d-5cd1-ff2e-eee36bf7e46c%40gmail.com|2022-01-13T10:10:00+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2021-4122|CVE-2021-4122]]|7.00|5.96| |
- | | |Re: CVE-2021-3997 in systemd|2022-01-04T07:14:29+00:00|2022-01-11T07:14:29+00:00|[[https://marc.info/?i=F97E792C-1249-4C6C-A1B2-23A2A835A941%40gentoo.org|2022-01-11T00:01:34+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2021-3997|CVE-2021-3997]]|7.00|6.67| | + | |[[https://systemd.io/|systemd]]|Re: CVE-2021-3997 in systemd|2022-01-04T07:14:29+00:00|2022-01-11T07:14:29+00:00|[[https://marc.info/?i=F97E792C-1249-4C6C-A1B2-23A2A835A941%40gentoo.org|2022-01-11T00:01:34+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2021-3997|CVE-2021-3997]]|7.00|6.67| |
- | | |Linux kernel: CVE-2021-4155|2022-01-03T17:32:24+00:00|2022-01-10T17:32:24+00:00|[[https://marc.info/?i=CAKx%2B4-rd1JnV%2BC-0kxq4NWn1N-BPOxZpE29iYsXk8Y6MqbVkAw%40mail.gmail.com|2022-01-10T12:19:47+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2021-4155|CVE-2021-4155]]|7.00|6.75| | + | |[[https://kernel.org|Linux]]|Linux kernel: CVE-2021-4155|2022-01-03T17:32:24+00:00|2022-01-10T17:32:24+00:00|[[https://marc.info/?i=CAKx%2B4-rd1JnV%2BC-0kxq4NWn1N-BPOxZpE29iYsXk8Y6MqbVkAw%40mail.gmail.com|2022-01-10T12:19:47+00:00]]|[[https://nvd.nist.gov/vuln/detail/CVE-2021-4155|CVE-2021-4155]]|7.00|6.75| |