Differences

This shows you the differences between two versions of the page.

Link to this comparison view

mailing-lists:distros:stats:2022 [2022/08/31 20:54]
aliguori created
mailing-lists:distros:stats:2022 [2023/11/06 17:45] (current)
solar update page heading, reduce indentation level of page content
Line 1: Line 1:
-==== Data ==== +====== ​Distros list data for 2022 ====== 
-^Project^Subject^Reported^Public^Time of oss-security posting^CVE(s)^Days embargoed (scheduled)^Days embargoed (oss-security)^+ 
 +The data here is unfortunately incomplete and unreliable, resulting from automated processing of input that wasn't meant to be fully machine-readable. 
 + 
 +^Project^Subject^Reported^Coordinated Release Date^Time of oss-security posting^CVE(s)^Days embargoed (scheduled)^Days embargoed (oss-security)^ 
 +^   ​December ​  ​^^^^^^^^ 
 +| |Re: Preview of X.Org Security Advisory for 2022-12-14|2022-12-05T23:​28:​51+00:​00|2022-12-12T23:​28:​51+00:​00|[[https://​marc.info/?​i=e7573ba8-846b-b91a-5655-e4f5db2cdf88%40redhat.com|2022-12-14T01:​23:​51+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-4283|CVE-2022-4283]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-46283|CVE-2022-46283]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-46340|CVE-2022-46340]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-46341|CVE-2022-46341]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-46342|CVE-2022-46342]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-46343|CVE-2022-46343]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-46344|CVE-2022-46344]]|7.00|8.04| 
 +^   ​November ​  ​^^^^^^^^ 
 +| |rxvt-unicode RCE|2022-11-28T00:​51:​42+00:​00|2022-12-05T00:​51:​42+00:​00|[[https://​marc.info/?​i=CAP9KPhDh6PJu-0mD12wYUraf1Ya1MSUPwz1PsPO5omi39-OYLw%40mail.gmail.com|2022-12-05T11:​22:​33+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-4170|CVE-2022-4170]]|7.00|7.42| 
 +| |Re: Security sensitive bug in the i915 kernel driver|2022-11-23T15:​31:​14+00:​00|2022-11-30T15:​31:​14+00:​00|[[https://​marc.info/?​i=c9089e54-bc0d-773c-233e-d63980ad49d4%40intel.com|2022-11-30T10:​22:​16+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-0330|CVE-2022-0330]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-4139|CVE-2022-4139]]|7.00|6.75| 
 +| |Fwd: [Security]Use after free in staging|2022-11-16T17:​16:​46+00:​00|2022-11-23T17:​16:​46+00:​00|[[https://​marc.info/?​i=CAJedcCyz-uNq%2BtyK%2BBqG0xCD9_WOOC8nta77Up7gaOBs%2BpfwyA%40mail.gmail.com|2022-11-18T03:​58:​55+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2015-0571|CVE-2015-0571]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2021-28660|CVE-2021-28660]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-4095|CVE-2022-4095]]|7.00|1.42| 
 +^   ​October ​  ​^^^^^^^^ 
 +| |Upcoming Git security fix release|2022-10-12T17:​47:​38+00:​00|2022-10-19T17:​47:​38+00:​00|[[https://​marc.info/?​i=Y07hdTCQHoSZjN2Q%40nand.local|2022-10-18T17:​25:​09+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-39253|CVE-2022-39253]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-39260|CVE-2022-39260]]|7.00|5.96| 
 +| |Re: CVE-2022-2602 - Linux kernel UAF|2022-10-11T14:​38:​03+00:​00|2022-10-18T14:​38:​03+00:​00|[[https://​marc.info/?​i=Y07bhw5Um02VYKvl%40quatroqueijos.cascardo.eti.br|2022-10-18T16:​59:​51+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2602|CVE-2022-2602]]|7.00|7.08| 
 +| |...|2022-10-03T16:​57:​49+00:​00|2022-10-10T16:​57:​49+00:​00|[[https://​marc.info/?​i=c1168996-ea72-ad04-027f-2f3b190eabd5%40isc.org|2022-10-05T16:​29:​06+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2928|CVE-2022-2928]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2929|CVE-2022-2929]]|7.00|1.96| 
 +^   ​September ​  ​^^^^^^^^ 
 +| |...|2022-09-20T06:​51:​45+00:​00|2022-09-27T06:​51:​45+00:​00|[[https://​marc.info/?​i=YyrddDfDHLntRmJk%40larwa.hq.kempniu.pl|2022-09-21T09:​46:​28+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2795|CVE-2022-2795]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2881|CVE-2022-2881]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2906|CVE-2022-2906]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-3080|CVE-2022-3080]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-38177|CVE-2022-38177]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-38178|CVE-2022-38178]]|7.00|1.08|
 ^   ​August ​  ​^^^^^^^^ ^   ​August ​  ​^^^^^^^^
-|[[https://​dpdk.org|DPDK]]|CVE-2022-2132 public disclosure date notice [vs-plain]|2022-08-25T08:​44:​16+00:​00|2022-09-01T08:44:16+00:​00|[[https://​marc.info/?​i=1705193.jNaZZp9DzI%40thomas|2022-08-29T18:​12:​18+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2132|CVE-2022-2132]]|7.00|4.38| +| |[report 2/?] Report vmalloc UAF in dvb-core/​dmxdev|2022-08-29T15:​58:​58+00:​00|2022-09-05T15:​58:​58+00:​00|[[https://​marc.info/?​i=20220923190601.GA364453%40ubuntu|2022-09-23T19:​06:​01+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-41218|CVE-2022-41218]]|7.00|25.12| 
-|[[https://​github.com/​vmware/​open-vm-tools|open-vm-tools]]|[SECURITY EMBARGOED] CVE-2022-31676:​ Local privilege escalation vulnerability in open-vm-tools|2022-08-11T15:​33:​18+00:​00|2022-08-18T15:33:18+00:​00|[[https://​marc.info/?​i=BYAPR05MB63436604DE6E9F49EAAAD1B1B9709%40BYAPR05MB6343.namprd05.prod.outlook.com|2022-08-23T20:​10:​48+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-31676|CVE-2022-31676]]|7.00|12.17|+|[[https://​github.com/​ClusterLabs/​pcs|pcs]]|PCS Security Issue|2022-08-25T14:​44:​38+00:​00|2022-09-01T14:​00:​00+00:​00|[[https://​marc.info/?​i=CAFqpC6zUc9DYKnBv3OBAsjOE9bgfGVqvoCW3B3f%3DCY43WfDVQA%40mail.gmail.com|2022-09-01T14:​00:​58+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2735|CVE-2022-2735]]|6.96|6.96| 
 +|[[https://​dpdk.org|DPDK]]|CVE-2022-2132 public disclosure date notice [vs-plain]|2022-08-25T08:​44:​16+00:​00|2022-08-29T15:00:00+00:​00|[[https://​marc.info/?​i=1705193.jNaZZp9DzI%40thomas|2022-08-29T18:​12:​18+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2132|CVE-2022-2132]]|4.25|4.38
 +|[[https://​curl.se|curl]]|curl:​ control code in cookie denial of service|2022-08-22T06:​45:​35+00:​00|2022-08-31T23:​59:​58+00:​00|[[https://​marc.info/?​i=8r186sn8-2orp-3n38-nno4-9o8n23n6s069%40unkk.fr|2022-08-31T06:​31:​44+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-35252|CVE-2022-35252]]|9.71|8.96
 +|[[https://​github.com/​vmware/​open-vm-tools|open-vm-tools]]|[SECURITY EMBARGOED] CVE-2022-31676:​ Local privilege escalation vulnerability in open-vm-tools|2022-08-11T15:​33:​18+00:​00|2022-08-23T23:59:59+00:​00|[[https://​marc.info/?​i=BYAPR05MB63436604DE6E9F49EAAAD1B1B9709%40BYAPR05MB6343.namprd05.prod.outlook.com|2022-08-23T20:​10:​48+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-31676|CVE-2022-31676]]|12.33|12.17|
 |[[https://​kernel.org|Linux]]|Linux NAT issue|2022-08-03T01:​55:​09+00:​00|2022-08-10T01:​55:​09+00:​00|[[https://​marc.info/?​i=CAP9KPhDskZ1W_wnJ_Z8sNY9nqwLGyL0k3pjYwrhJ_TQnXcC-HA%40mail.gmail.com|2022-08-30T02:​27:​44+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2663|CVE-2022-2663]]|7.00|27.00| |[[https://​kernel.org|Linux]]|Linux NAT issue|2022-08-03T01:​55:​09+00:​00|2022-08-10T01:​55:​09+00:​00|[[https://​marc.info/?​i=CAP9KPhDskZ1W_wnJ_Z8sNY9nqwLGyL0k3pjYwrhJ_TQnXcC-HA%40mail.gmail.com|2022-08-30T02:​27:​44+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2663|CVE-2022-2663]]|7.00|27.00|
-|[[https://​kernel.org|Linux]]|Re:​ CVE-2022-2586|2022-08-03T00:​23:​10+00:​00|2022-08-10T00:23:10+00:​00|[[https://​marc.info/?​i=YvKVC%2FO%2BtGfNNm35%40quatroqueijos|2022-08-09T17:​10:​35+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2586|CVE-2022-2586]]|7.00|6.67| +|[[https://​kernel.org|Linux]]|Re:​ CVE-2022-2586|2022-08-03T00:​23:​10+00:​00|2022-08-09T17:00:00+00:​00|[[https://​marc.info/?​i=YvKVC%2FO%2BtGfNNm35%40quatroqueijos|2022-08-09T17:​10:​35+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2586|CVE-2022-2586]]|6.67|6.67| 
-|[[https://​kernel.org|Linux]]|CVE-2022-2585|2022-08-03T00:​15:​25+00:​00|2022-08-10T00:15:25+00:​00|[[https://​marc.info/?​i=YvKVxLtBs86r6Dmh%40quatroqueijos|2022-08-09T17:​13:​40+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2585|CVE-2022-2585]]|7.00|6.67| +|[[https://​kernel.org|Linux]]|CVE-2022-2585|2022-08-03T00:​15:​25+00:​00|2022-08-09T17:00:00+00:​00|[[https://​marc.info/?​i=YvKVxLtBs86r6Dmh%40quatroqueijos|2022-08-09T17:​13:​40+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2585|CVE-2022-2585]]|6.67|6.67| 
-|[[https://​kernel.org|Linux]]|class_route UAF report (was Re: CVE-2022-2588)|2022-08-02T19:​58:​24+00:​00|2022-08-09T19:58:24+00:​00|[[https://​marc.info/?​i=YvKVWuPyQ%2FYXBT%2Bo%40quatroqueijos|2022-08-09T17:​11:​54+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2011-1019|CVE-2011-1019]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2588|CVE-2022-2588]]|7.00|6.88|+|[[https://​kernel.org|Linux]]|class_route UAF report (was Re: CVE-2022-2588)|2022-08-02T19:​58:​24+00:​00|2022-08-09T17:00:00+00:​00|[[https://​marc.info/?​i=YvKVWuPyQ%2FYXBT%2Bo%40quatroqueijos|2022-08-09T17:​11:​54+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2011-1019|CVE-2011-1019]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2588|CVE-2022-2588]]|6.88|6.88|
 ^   ​July ​  ​^^^^^^^^ ^   ​July ​  ​^^^^^^^^
 |[[https://​kernel.org|Linux]]|Re:​ ...|2022-07-31T18:​16:​32+00:​00|2022-08-07T18:​16:​32+00:​00|[[https://​marc.info/?​i=1973d16e-bb3e-c5b2-74e0-cc2faf9db2bd%40redhat.com|2022-08-08T07:​18:​27+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2016-5195|CVE-2016-5195]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2590|CVE-2022-2590]]|7.00|7.54| |[[https://​kernel.org|Linux]]|Re:​ ...|2022-07-31T18:​16:​32+00:​00|2022-08-07T18:​16:​32+00:​00|[[https://​marc.info/?​i=1973d16e-bb3e-c5b2-74e0-cc2faf9db2bd%40redhat.com|2022-08-08T07:​18:​27+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2016-5195|CVE-2016-5195]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2590|CVE-2022-2590]]|7.00|7.54|
Line 29: Line 47:
 |[[https://​github.com/​logrotate/​logrotate|logrotate]]|Re:​ ...|2022-05-25T13:​19:​31+00:​00|2022-06-01T13:​19:​31+00:​00|[[https://​marc.info/?​i=c41c3628-6132-9893-55ce-d86ff251e4fd%40canonical.com|2022-05-25T13:​37:​24+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-1348|CVE-2022-1348]]|7.00|0.00| |[[https://​github.com/​logrotate/​logrotate|logrotate]]|Re:​ ...|2022-05-25T13:​19:​31+00:​00|2022-06-01T13:​19:​31+00:​00|[[https://​marc.info/?​i=c41c3628-6132-9893-55ce-d86ff251e4fd%40canonical.com|2022-05-25T13:​37:​24+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-1348|CVE-2022-1348]]|7.00|0.00|
 ^   ​March ​  ​^^^^^^^^ ^   ​March ​  ​^^^^^^^^
-|[[https://​kernel.org|Linux]]|Vulnerability in nf_tables can cause privilege escalation|2022-03-17T02:​08:​11+00:​00|2022-03-24T02:​08:​11+00:​00|[[https://​marc.info/?​i=20220825132856.GA29197%40openwall.com|2022-08-25T13:​28:​56+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-1015|CVE-2022-1015]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-1016|CVE-2022-1016]]|7.00|161.46| +|[[https://​kernel.org|Linux]]|Vulnerability in nf_tables can cause privilege escalation|2022-03-17T02:​08:​11+00:​00|2022-03-24T02:​08:​11+00:​00|[[https://​marc.info/?​i=20220825132856.GA29197%40openwall.com|2022-08-25T13:​28:​56+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-1015|CVE-2022-1015]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-1016|CVE-2022-1016]]|7.00|161.46((This is not for real - a much later follow-up oss-security posting was wrongly picked up when automatically generating this data, whereas the original was apparently on March 28))
-|[[https://​kernel.org|Linux]]|CVE-2022-0847:​ overwriting read-only files on Linux|2022-03-07T12:​01:​19+00:​00|2022-03-14T12:​01:​19+00:​00|[[https://​marc.info/?​i=1973d16e-bb3e-c5b2-74e0-cc2faf9db2bd%40redhat.com|2022-08-08T07:​18:​27+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2016-5195|CVE-2016-5195]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-0847|CVE-2022-0847]]|7.00|153.79|+|[[https://​kernel.org|Linux]]|CVE-2022-0847:​ overwriting read-only files on Linux|2022-03-07T12:​01:​19+00:​00|2022-03-14T12:​01:​19+00:​00|[[https://​marc.info/?​i=1973d16e-bb3e-c5b2-74e0-cc2faf9db2bd%40redhat.com|2022-08-08T07:​18:​27+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2016-5195|CVE-2016-5195]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-0847|CVE-2022-0847]]|7.00|153.79((This is not for real - a much earlier linux-distros posting was wrongly picked up when automatically generating this data))|
 ^   ​February ​  ​^^^^^^^^ ^   ​February ​  ​^^^^^^^^
 |[[https://​kernel.org|Linux]]|Vulnerability in Linux kernels until 5.6.11|2022-02-28T08:​20:​32+00:​00|2022-03-07T08:​20:​32+00:​00|[[https://​marc.info/?​i=CAKPOu%2B8WtknWoUeY-CTK5ejo0hOQDsPOsbO12pFK6ifJwmVo4Q%40mail.gmail.com|2022-03-07T12:​01:​19+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-0847|CVE-2022-0847]]|7.00|7.12| |[[https://​kernel.org|Linux]]|Vulnerability in Linux kernels until 5.6.11|2022-02-28T08:​20:​32+00:​00|2022-03-07T08:​20:​32+00:​00|[[https://​marc.info/?​i=CAKPOu%2B8WtknWoUeY-CTK5ejo0hOQDsPOsbO12pFK6ifJwmVo4Q%40mail.gmail.com|2022-03-07T12:​01:​19+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-0847|CVE-2022-0847]]|7.00|7.12|
 ^   ​January ​  ​^^^^^^^^ ^   ​January ​  ​^^^^^^^^
-| |Re: Vulnerability in the vmwgfx driver|2022-01-21T12:​07:​12+00:​00|2022-01-28T12:​07:​12+00:​00|[[https://​marc.info/?​i=0f115734-5e21-8fa9-7e96-f8636788a0bc%40grsecurity.net|2022-01-27T20:​00:​19+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-22942|CVE-2022-22942]]|7.00|6.29| +|[[https://​kernel.org|Linux]]|Re: Vulnerability in the vmwgfx driver|2022-01-21T12:​07:​12+00:​00|2022-01-28T12:​07:​12+00:​00|[[https://​marc.info/?​i=0f115734-5e21-8fa9-7e96-f8636788a0bc%40grsecurity.net|2022-01-27T20:​00:​19+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-22942|CVE-2022-22942]]|7.00|6.29| 
-| |Re: Security sensitive bug in the i915 kernel driver|2022-01-18T14:​32:​16+00:​00|2022-01-25T14:​32:​16+00:​00|[[https://​marc.info/?​i=7460e2a7-4323-3914-bcd6-1d07c859abe5%40linux.intel.com|2022-01-25T17:​55:​25+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-0330|CVE-2022-0330]]|7.00|7.12| +|[[https://​kernel.org|Linux]]|Re: Security sensitive bug in the i915 kernel driver|2022-01-18T14:​32:​16+00:​00|2022-01-25T14:​32:​16+00:​00|[[https://​marc.info/?​i=7460e2a7-4323-3914-bcd6-1d07c859abe5%40linux.intel.com|2022-01-25T17:​55:​25+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-0330|CVE-2022-0330]]|7.00|7.12| 
-| |Re: CVE-2022-21658:​ TOCTOU in Rust's std::​fs::​remove_dir_all|2022-01-17T11:​29:​52+00:​00|2022-01-24T11:​29:​52+00:​00|[[https://​marc.info/?​i=7a65d359-c698-a308-e6e8-3c0c44cff037%40pietroalbini.org|2022-01-20T11:​02:​55+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2021-3997|CVE-2021-3997]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-21658|CVE-2022-21658]]|7.00|2.96| +|[[https://​www.rust-lang.org/​|rust]]|Re: CVE-2022-21658:​ TOCTOU in Rust's std::​fs::​remove_dir_all|2022-01-17T11:​29:​52+00:​00|2022-01-24T11:​29:​52+00:​00|[[https://​marc.info/?​i=7a65d359-c698-a308-e6e8-3c0c44cff037%40pietroalbini.org|2022-01-20T11:​02:​55+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2021-3997|CVE-2021-3997]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-21658|CVE-2022-21658]]|7.00|2.96| 
-| |Re: ***UNCHECKED*** CVE-2021-45417 - aide: heap-based buffer overflow vulnerability in base64 functions|2022-01-16T13:​00:​34+00:​00|2022-01-23T13:​00:​34+00:​00|[[https://​marc.info/?​i=YemPSkQtnUCflmaH%40sulfur.vonhaugwitz.com|2022-01-20T16:​35:​22+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2021-45417|CVE-2021-45417]]|7.00|4.12| +|[[https://​aide.github.io/​|aide]]|Re: ***UNCHECKED*** CVE-2021-45417 - aide: heap-based buffer overflow vulnerability in base64 functions|2022-01-16T13:​00:​34+00:​00|2022-01-23T13:​00:​34+00:​00|[[https://​marc.info/?​i=YemPSkQtnUCflmaH%40sulfur.vonhaugwitz.com|2022-01-20T16:​35:​22+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2021-45417|CVE-2021-45417]]|7.00|4.12| 
-| |usbview polkit policy local root exploit (CVE-2022-23220)|2022-01-13T13:​30:​52+00:​00|2022-01-20T13:​30:​52+00:​00|[[https://​marc.info/?​i=YerETqS%2BHCN4qz%2FZ%40f195.suse.de|2022-01-21T14:​33:​50+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-23220|CVE-2022-23220]]|7.00|8.04| +|[[https://​github.com/​gregkh/​usbview|usbview]]|usbview polkit policy local root exploit (CVE-2022-23220)|2022-01-13T13:​30:​52+00:​00|2022-01-20T13:​30:​52+00:​00|[[https://​marc.info/?​i=YerETqS%2BHCN4qz%2FZ%40f195.suse.de|2022-01-21T14:​33:​50+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-23220|CVE-2022-23220]]|7.00|8.04| 
-| |Re: Prosody XMPP Server 0.11.x Unauthenticated Remote Denial of Service / Resource Exhaustion|2022-01-12T07:​58:​16+00:​00|2022-01-19T07:​58:​16+00:​00|[[https://​marc.info/?​i=2193597.LkMCQtBBq3%40sinistra|2022-01-13T17:​07:​44+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-0217|CVE-2022-0217]]|7.00|1.38| +|[[https://​prosody.im/​|prosody]]|Re: Prosody XMPP Server 0.11.x Unauthenticated Remote Denial of Service / Resource Exhaustion|2022-01-12T07:​58:​16+00:​00|2022-01-19T07:​58:​16+00:​00|[[https://​marc.info/?​i=2193597.LkMCQtBBq3%40sinistra|2022-01-13T17:​07:​44+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-0217|CVE-2022-0217]]|7.00|1.38| 
-| |Re: CVE-2021-4034 (patch)|2022-01-12T00:​01:​39+00:​00|2022-01-19T00:​01:​39+00:​00|[[https://​marc.info/?​i=F9283FD4-A0FC-4944-8659-530684BB33F8%40gentoo.org|2022-01-25T18:​04:​49+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2021-4034|CVE-2021-4034]]|7.00|13.75| +|[[https://​gitlab.freedesktop.org/​polkit/​polkit|polkit]]|Re: CVE-2021-4034 (patch)|2022-01-12T00:​01:​39+00:​00|2022-01-19T00:​01:​39+00:​00|[[https://​marc.info/?​i=F9283FD4-A0FC-4944-8659-530684BB33F8%40gentoo.org|2022-01-25T18:​04:​49+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2021-4034|CVE-2021-4034]]|7.00|13.75| 
-| |Out-of-bounds write of heap buffer in fs_context.c leads to LPE and container escape|2022-01-11T09:​01:​05+00:​00|2022-01-18T09:​01:​05+00:​00|[[https://​marc.info/?​i=215FEA11-77C7-42C1-97AB-8B3F637F9C61%40oracle.com|2022-01-18T18:​57:​57+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-0185|CVE-2022-0185]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-0216|CVE-2022-0216]]|7.00|7.38| +|[[https://​kernel.org|Linux]]|Out-of-bounds write of heap buffer in fs_context.c leads to LPE and container escape|2022-01-11T09:​01:​05+00:​00|2022-01-18T09:​01:​05+00:​00|[[https://​marc.info/?​i=215FEA11-77C7-42C1-97AB-8B3F637F9C61%40oracle.com|2022-01-18T18:​57:​57+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-0185|CVE-2022-0185]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-0216|CVE-2022-0216]]|7.00|7.38| 
-| |Re: LUKS2 / cryptsetup: CVE-2021-4122 disabling encryption via header rewrite|2022-01-07T10:​15:​50+00:​00|2022-01-14T10:​15:​50+00:​00|[[https://​marc.info/?​i=49e8cc07-ff0d-5cd1-ff2e-eee36bf7e46c%40gmail.com|2022-01-13T10:​10:​00+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2021-4122|CVE-2021-4122]]|7.00|5.96| +|[[https://​gitlab.com/​cryptsetup/​cryptsetup|cryptsetup]]|Re: LUKS2 / cryptsetup: CVE-2021-4122 disabling encryption via header rewrite|2022-01-07T10:​15:​50+00:​00|2022-01-14T10:​15:​50+00:​00|[[https://​marc.info/?​i=49e8cc07-ff0d-5cd1-ff2e-eee36bf7e46c%40gmail.com|2022-01-13T10:​10:​00+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2021-4122|CVE-2021-4122]]|7.00|5.96| 
-| |Re: CVE-2021-3997 in systemd|2022-01-04T07:​14:​29+00:​00|2022-01-11T07:​14:​29+00:​00|[[https://​marc.info/?​i=F97E792C-1249-4C6C-A1B2-23A2A835A941%40gentoo.org|2022-01-11T00:​01:​34+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2021-3997|CVE-2021-3997]]|7.00|6.67| +|[[https://​systemd.io/​|systemd]]|Re: CVE-2021-3997 in systemd|2022-01-04T07:​14:​29+00:​00|2022-01-11T07:​14:​29+00:​00|[[https://​marc.info/?​i=F97E792C-1249-4C6C-A1B2-23A2A835A941%40gentoo.org|2022-01-11T00:​01:​34+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2021-3997|CVE-2021-3997]]|7.00|6.67| 
-| |Linux kernel: CVE-2021-4155|2022-01-03T17:​32:​24+00:​00|2022-01-10T17:​32:​24+00:​00|[[https://​marc.info/?​i=CAKx%2B4-rd1JnV%2BC-0kxq4NWn1N-BPOxZpE29iYsXk8Y6MqbVkAw%40mail.gmail.com|2022-01-10T12:​19:​47+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2021-4155|CVE-2021-4155]]|7.00|6.75| +|[[https://​kernel.org|Linux]]|Linux kernel: CVE-2021-4155|2022-01-03T17:​32:​24+00:​00|2022-01-10T17:​32:​24+00:​00|[[https://​marc.info/?​i=CAKx%2B4-rd1JnV%2BC-0kxq4NWn1N-BPOxZpE29iYsXk8Y6MqbVkAw%40mail.gmail.com|2022-01-10T12:​19:​47+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2021-4155|CVE-2021-4155]]|7.00|6.75|
  
mailing-lists/distros/stats/2022.1661972048.txt · Last modified: 2022/08/31 20:54 by aliguori
 
Except where otherwise noted, content on this wiki is licensed under the following license: CC Attribution-Noncommercial-Share Alike 3.0 Unported
Recent changes RSS feed Donate to DokuWiki Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki Powered by OpenVZ Powered by Openwall GNU/*/Linux