Differences

This shows you the differences between two versions of the page.

Link to this comparison view

mailing-lists:distros:stats:2022 [2022/09/01 17:29]
aliguori
mailing-lists:distros:stats:2022 [2023/11/06 17:45] (current)
solar update page heading, reduce indentation level of page content
Line 1: Line 1:
-==== Data ====+====== ​Distros list data for 2022 ====== 
 + 
 +The data here is unfortunately incomplete and unreliable, resulting from automated processing of input that wasn't meant to be fully machine-readable. 
 ^Project^Subject^Reported^Coordinated Release Date^Time of oss-security posting^CVE(s)^Days embargoed (scheduled)^Days embargoed (oss-security)^ ^Project^Subject^Reported^Coordinated Release Date^Time of oss-security posting^CVE(s)^Days embargoed (scheduled)^Days embargoed (oss-security)^
 +^   ​December ​  ​^^^^^^^^
 +| |Re: Preview of X.Org Security Advisory for 2022-12-14|2022-12-05T23:​28:​51+00:​00|2022-12-12T23:​28:​51+00:​00|[[https://​marc.info/?​i=e7573ba8-846b-b91a-5655-e4f5db2cdf88%40redhat.com|2022-12-14T01:​23:​51+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-4283|CVE-2022-4283]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-46283|CVE-2022-46283]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-46340|CVE-2022-46340]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-46341|CVE-2022-46341]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-46342|CVE-2022-46342]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-46343|CVE-2022-46343]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-46344|CVE-2022-46344]]|7.00|8.04|
 +^   ​November ​  ​^^^^^^^^
 +| |rxvt-unicode RCE|2022-11-28T00:​51:​42+00:​00|2022-12-05T00:​51:​42+00:​00|[[https://​marc.info/?​i=CAP9KPhDh6PJu-0mD12wYUraf1Ya1MSUPwz1PsPO5omi39-OYLw%40mail.gmail.com|2022-12-05T11:​22:​33+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-4170|CVE-2022-4170]]|7.00|7.42|
 +| |Re: Security sensitive bug in the i915 kernel driver|2022-11-23T15:​31:​14+00:​00|2022-11-30T15:​31:​14+00:​00|[[https://​marc.info/?​i=c9089e54-bc0d-773c-233e-d63980ad49d4%40intel.com|2022-11-30T10:​22:​16+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-0330|CVE-2022-0330]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-4139|CVE-2022-4139]]|7.00|6.75|
 +| |Fwd: [Security]Use after free in staging|2022-11-16T17:​16:​46+00:​00|2022-11-23T17:​16:​46+00:​00|[[https://​marc.info/?​i=CAJedcCyz-uNq%2BtyK%2BBqG0xCD9_WOOC8nta77Up7gaOBs%2BpfwyA%40mail.gmail.com|2022-11-18T03:​58:​55+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2015-0571|CVE-2015-0571]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2021-28660|CVE-2021-28660]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-4095|CVE-2022-4095]]|7.00|1.42|
 +^   ​October ​  ​^^^^^^^^
 +| |Upcoming Git security fix release|2022-10-12T17:​47:​38+00:​00|2022-10-19T17:​47:​38+00:​00|[[https://​marc.info/?​i=Y07hdTCQHoSZjN2Q%40nand.local|2022-10-18T17:​25:​09+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-39253|CVE-2022-39253]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-39260|CVE-2022-39260]]|7.00|5.96|
 +| |Re: CVE-2022-2602 - Linux kernel UAF|2022-10-11T14:​38:​03+00:​00|2022-10-18T14:​38:​03+00:​00|[[https://​marc.info/?​i=Y07bhw5Um02VYKvl%40quatroqueijos.cascardo.eti.br|2022-10-18T16:​59:​51+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2602|CVE-2022-2602]]|7.00|7.08|
 +| |...|2022-10-03T16:​57:​49+00:​00|2022-10-10T16:​57:​49+00:​00|[[https://​marc.info/?​i=c1168996-ea72-ad04-027f-2f3b190eabd5%40isc.org|2022-10-05T16:​29:​06+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2928|CVE-2022-2928]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2929|CVE-2022-2929]]|7.00|1.96|
 +^   ​September ​  ​^^^^^^^^
 +| |...|2022-09-20T06:​51:​45+00:​00|2022-09-27T06:​51:​45+00:​00|[[https://​marc.info/?​i=YyrddDfDHLntRmJk%40larwa.hq.kempniu.pl|2022-09-21T09:​46:​28+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2795|CVE-2022-2795]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2881|CVE-2022-2881]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2906|CVE-2022-2906]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-3080|CVE-2022-3080]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-38177|CVE-2022-38177]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-38178|CVE-2022-38178]]|7.00|1.08|
 ^   ​August ​  ​^^^^^^^^ ^   ​August ​  ​^^^^^^^^
 +| |[report 2/?] Report vmalloc UAF in dvb-core/​dmxdev|2022-08-29T15:​58:​58+00:​00|2022-09-05T15:​58:​58+00:​00|[[https://​marc.info/?​i=20220923190601.GA364453%40ubuntu|2022-09-23T19:​06:​01+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-41218|CVE-2022-41218]]|7.00|25.12|
 |[[https://​github.com/​ClusterLabs/​pcs|pcs]]|PCS Security Issue|2022-08-25T14:​44:​38+00:​00|2022-09-01T14:​00:​00+00:​00|[[https://​marc.info/?​i=CAFqpC6zUc9DYKnBv3OBAsjOE9bgfGVqvoCW3B3f%3DCY43WfDVQA%40mail.gmail.com|2022-09-01T14:​00:​58+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2735|CVE-2022-2735]]|6.96|6.96| |[[https://​github.com/​ClusterLabs/​pcs|pcs]]|PCS Security Issue|2022-08-25T14:​44:​38+00:​00|2022-09-01T14:​00:​00+00:​00|[[https://​marc.info/?​i=CAFqpC6zUc9DYKnBv3OBAsjOE9bgfGVqvoCW3B3f%3DCY43WfDVQA%40mail.gmail.com|2022-09-01T14:​00:​58+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2735|CVE-2022-2735]]|6.96|6.96|
 |[[https://​dpdk.org|DPDK]]|CVE-2022-2132 public disclosure date notice [vs-plain]|2022-08-25T08:​44:​16+00:​00|2022-08-29T15:​00:​00+00:​00|[[https://​marc.info/?​i=1705193.jNaZZp9DzI%40thomas|2022-08-29T18:​12:​18+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2132|CVE-2022-2132]]|4.25|4.38| |[[https://​dpdk.org|DPDK]]|CVE-2022-2132 public disclosure date notice [vs-plain]|2022-08-25T08:​44:​16+00:​00|2022-08-29T15:​00:​00+00:​00|[[https://​marc.info/?​i=1705193.jNaZZp9DzI%40thomas|2022-08-29T18:​12:​18+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2132|CVE-2022-2132]]|4.25|4.38|
-| |curl: control code in cookie denial of service|2022-08-22T06:​45:​35+00:​00|2022-08-31T23:​59:​58+00:​00|[[https://​marc.info/?​i=8r186sn8-2orp-3n38-nno4-9o8n23n6s069%40unkk.fr|2022-08-31T06:​31:​44+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-35252|CVE-2022-35252]]|9.71|8.96|+|[[https://​curl.se|curl]]|curl: control code in cookie denial of service|2022-08-22T06:​45:​35+00:​00|2022-08-31T23:​59:​58+00:​00|[[https://​marc.info/?​i=8r186sn8-2orp-3n38-nno4-9o8n23n6s069%40unkk.fr|2022-08-31T06:​31:​44+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-35252|CVE-2022-35252]]|9.71|8.96|
 |[[https://​github.com/​vmware/​open-vm-tools|open-vm-tools]]|[SECURITY EMBARGOED] CVE-2022-31676:​ Local privilege escalation vulnerability in open-vm-tools|2022-08-11T15:​33:​18+00:​00|2022-08-23T23:​59:​59+00:​00|[[https://​marc.info/?​i=BYAPR05MB63436604DE6E9F49EAAAD1B1B9709%40BYAPR05MB6343.namprd05.prod.outlook.com|2022-08-23T20:​10:​48+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-31676|CVE-2022-31676]]|12.33|12.17| |[[https://​github.com/​vmware/​open-vm-tools|open-vm-tools]]|[SECURITY EMBARGOED] CVE-2022-31676:​ Local privilege escalation vulnerability in open-vm-tools|2022-08-11T15:​33:​18+00:​00|2022-08-23T23:​59:​59+00:​00|[[https://​marc.info/?​i=BYAPR05MB63436604DE6E9F49EAAAD1B1B9709%40BYAPR05MB6343.namprd05.prod.outlook.com|2022-08-23T20:​10:​48+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-31676|CVE-2022-31676]]|12.33|12.17|
 |[[https://​kernel.org|Linux]]|Linux NAT issue|2022-08-03T01:​55:​09+00:​00|2022-08-10T01:​55:​09+00:​00|[[https://​marc.info/?​i=CAP9KPhDskZ1W_wnJ_Z8sNY9nqwLGyL0k3pjYwrhJ_TQnXcC-HA%40mail.gmail.com|2022-08-30T02:​27:​44+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2663|CVE-2022-2663]]|7.00|27.00| |[[https://​kernel.org|Linux]]|Linux NAT issue|2022-08-03T01:​55:​09+00:​00|2022-08-10T01:​55:​09+00:​00|[[https://​marc.info/?​i=CAP9KPhDskZ1W_wnJ_Z8sNY9nqwLGyL0k3pjYwrhJ_TQnXcC-HA%40mail.gmail.com|2022-08-30T02:​27:​44+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-2663|CVE-2022-2663]]|7.00|27.00|
Line 31: Line 47:
 |[[https://​github.com/​logrotate/​logrotate|logrotate]]|Re:​ ...|2022-05-25T13:​19:​31+00:​00|2022-06-01T13:​19:​31+00:​00|[[https://​marc.info/?​i=c41c3628-6132-9893-55ce-d86ff251e4fd%40canonical.com|2022-05-25T13:​37:​24+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-1348|CVE-2022-1348]]|7.00|0.00| |[[https://​github.com/​logrotate/​logrotate|logrotate]]|Re:​ ...|2022-05-25T13:​19:​31+00:​00|2022-06-01T13:​19:​31+00:​00|[[https://​marc.info/?​i=c41c3628-6132-9893-55ce-d86ff251e4fd%40canonical.com|2022-05-25T13:​37:​24+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-1348|CVE-2022-1348]]|7.00|0.00|
 ^   ​March ​  ​^^^^^^^^ ^   ​March ​  ​^^^^^^^^
-|[[https://​kernel.org|Linux]]|Vulnerability in nf_tables can cause privilege escalation|2022-03-17T02:​08:​11+00:​00|2022-03-24T02:​08:​11+00:​00|[[https://​marc.info/?​i=20220825132856.GA29197%40openwall.com|2022-08-25T13:​28:​56+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-1015|CVE-2022-1015]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-1016|CVE-2022-1016]]|7.00|161.46| +|[[https://​kernel.org|Linux]]|Vulnerability in nf_tables can cause privilege escalation|2022-03-17T02:​08:​11+00:​00|2022-03-24T02:​08:​11+00:​00|[[https://​marc.info/?​i=20220825132856.GA29197%40openwall.com|2022-08-25T13:​28:​56+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-1015|CVE-2022-1015]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-1016|CVE-2022-1016]]|7.00|161.46((This is not for real - a much later follow-up oss-security posting was wrongly picked up when automatically generating this data, whereas the original was apparently on March 28))
-|[[https://​kernel.org|Linux]]|CVE-2022-0847:​ overwriting read-only files on Linux|2022-03-07T12:​01:​19+00:​00|2022-03-14T12:​01:​19+00:​00|[[https://​marc.info/?​i=1973d16e-bb3e-c5b2-74e0-cc2faf9db2bd%40redhat.com|2022-08-08T07:​18:​27+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2016-5195|CVE-2016-5195]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-0847|CVE-2022-0847]]|7.00|153.79|+|[[https://​kernel.org|Linux]]|CVE-2022-0847:​ overwriting read-only files on Linux|2022-03-07T12:​01:​19+00:​00|2022-03-14T12:​01:​19+00:​00|[[https://​marc.info/?​i=1973d16e-bb3e-c5b2-74e0-cc2faf9db2bd%40redhat.com|2022-08-08T07:​18:​27+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2016-5195|CVE-2016-5195]]\\ [[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-0847|CVE-2022-0847]]|7.00|153.79((This is not for real - a much earlier linux-distros posting was wrongly picked up when automatically generating this data))|
 ^   ​February ​  ​^^^^^^^^ ^   ​February ​  ​^^^^^^^^
 |[[https://​kernel.org|Linux]]|Vulnerability in Linux kernels until 5.6.11|2022-02-28T08:​20:​32+00:​00|2022-03-07T08:​20:​32+00:​00|[[https://​marc.info/?​i=CAKPOu%2B8WtknWoUeY-CTK5ejo0hOQDsPOsbO12pFK6ifJwmVo4Q%40mail.gmail.com|2022-03-07T12:​01:​19+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-0847|CVE-2022-0847]]|7.00|7.12| |[[https://​kernel.org|Linux]]|Vulnerability in Linux kernels until 5.6.11|2022-02-28T08:​20:​32+00:​00|2022-03-07T08:​20:​32+00:​00|[[https://​marc.info/?​i=CAKPOu%2B8WtknWoUeY-CTK5ejo0hOQDsPOsbO12pFK6ifJwmVo4Q%40mail.gmail.com|2022-03-07T12:​01:​19+00:​00]]|[[https://​nvd.nist.gov/​vuln/​detail/​CVE-2022-0847|CVE-2022-0847]]|7.00|7.12|
mailing-lists/distros/stats/2022.1662046193.txt · Last modified: 2022/09/01 17:29 by aliguori
 
Except where otherwise noted, content on this wiki is licensed under the following license: CC Attribution-Noncommercial-Share Alike 3.0 Unported
Recent changes RSS feed Donate to DokuWiki Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki Powered by OpenVZ Powered by Openwall GNU/*/Linux