Merge ~alexmurray/ubuntu-cve-tracker:launchpad-yaml-for-check-syntax into ubuntu-cve-tracker:master
- Git
- lp:~alexmurray/ubuntu-cve-tracker
- launchpad-yaml-for-check-syntax
- Merge into master
Proposed by
Alex Murray
Status: | Merged |
---|---|
Merged at revision: | cd6fc6d4873bee751cc6452dfb04a4a3d21b5f5e |
Proposed branch: | ~alexmurray/ubuntu-cve-tracker:launchpad-yaml-for-check-syntax |
Merge into: | ubuntu-cve-tracker:master |
Diff against target: |
1498 lines (+277/-150) 35 files modified
.launchpad.yaml (+50/-0) active/CVE-2021-33621 (+1/-1) active/CVE-2021-3669 (+2/-1) active/CVE-2021-4155 (+5/-4) active/CVE-2021-43618 (+2/-1) active/CVE-2022-20566 (+5/-4) active/CVE-2022-3424 (+2/-1) active/CVE-2022-3521 (+6/-4) active/CVE-2022-3545 (+6/-4) active/CVE-2022-3628 (+6/-4) active/CVE-2022-36280 (+2/-1) active/CVE-2022-3640 (+6/-4) active/CVE-2022-41218 (+2/-1) active/CVE-2022-41858 (+5/-4) active/CVE-2022-42328 (+6/-4) active/CVE-2022-42329 (+6/-4) active/CVE-2022-42895 (+11/-8) active/CVE-2022-47929 (+2/-1) active/CVE-2023-0045 (+7/-5) active/CVE-2023-0266 (+2/-1) active/CVE-2023-0394 (+2/-1) active/CVE-2023-0461 (+6/-4) active/CVE-2023-0795 (+8/-6) active/CVE-2023-0796 (+8/-6) active/CVE-2023-0797 (+8/-6) active/CVE-2023-0798 (+8/-6) active/CVE-2023-0799 (+8/-6) active/CVE-2023-0800 (+8/-6) active/CVE-2023-0801 (+8/-6) active/CVE-2023-0802 (+8/-6) active/CVE-2023-0803 (+8/-6) active/CVE-2023-0804 (+8/-6) active/CVE-2023-23455 (+2/-1) active/CVE-2023-23559 (+7/-5) scripts/packages-mirror (+46/-22) |
Related bugs: |
Reviewer | Review Type | Date Requested | Status |
---|---|---|---|
Ubuntu Security Team | Pending | ||
Review via email: mp+432413@code.launchpad.net |
Commit message
Description of the change
To post a comment you must log in.
Revision history for this message
Alex Murray (alexmurray) wrote : | # |
Preview Diff
[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1 | diff --git a/.launchpad.yaml b/.launchpad.yaml | |||
2 | 0 | new file mode 100644 | 0 | new file mode 100644 |
3 | index 0000000..1773ff9 | |||
4 | --- /dev/null | |||
5 | +++ b/.launchpad.yaml | |||
6 | @@ -0,0 +1,50 @@ | |||
7 | 1 | license: | ||
8 | 2 | spdx: GPL-3.0 | ||
9 | 3 | |||
10 | 4 | pipeline: | ||
11 | 5 | - tests | ||
12 | 6 | jobs: | ||
13 | 7 | tests: | ||
14 | 8 | series: jammy | ||
15 | 9 | architectures: amd64 | ||
16 | 10 | packages: | ||
17 | 11 | - distro-info | ||
18 | 12 | - lsb-release | ||
19 | 13 | - python3 | ||
20 | 14 | - python3-apt | ||
21 | 15 | - python3-configobj | ||
22 | 16 | - python3-progressbar | ||
23 | 17 | - python3-pytest | ||
24 | 18 | - python3-yaml | ||
25 | 19 | - rsync | ||
26 | 20 | - wget | ||
27 | 21 | run-before: | | ||
28 | 22 | # configure a basic ~/.ubuntu-cve-tracker.conf and setup packages-mirror | ||
29 | 23 | # for source_map | ||
30 | 24 | echo plb_authentication=/dev/null > ~/.ubuntu-cve-tracker.conf | ||
31 | 25 | echo "packages_mirror=$HOME/mirrors/ubuntu/" >> ~/.ubuntu-cve-tracker.conf | ||
32 | 26 | for mirror in debian partner; do | ||
33 | 27 | echo "${mirror}_mirror=$HOME/mirrors/${mirror}/" >> ~/.ubuntu-cve-tracker.conf | ||
34 | 28 | done | ||
35 | 29 | echo "Setting up packages-mirror..." | ||
36 | 30 | # use wget for packages-mirror since rsync is not accessible in lp | ||
37 | 31 | # builders - also invoke with -v since this seems to make downloading more | ||
38 | 32 | # reliable (probably slows down wget or somesuch to it doesn't thrash the | ||
39 | 33 | # internal mirror) | ||
40 | 34 | echo "./scripts/packages-mirror -w -v" | ||
41 | 35 | ./scripts/packages-mirror -w -v | ||
42 | 36 | run: | | ||
43 | 37 | export UCT=$(pwd) | ||
44 | 38 | # when lpcraft runs on a local users machine where embargoed already | ||
45 | 39 | # exists as a symlink it won't point to anywhere so remove that and fake a | ||
46 | 40 | # new one | ||
47 | 41 | rm -f embargoed | ||
48 | 42 | mkdir embargoed | ||
49 | 43 | echo "Running unit tests..." | ||
50 | 44 | ./scripts/test_cve_lib.py | ||
51 | 45 | ./scripts/test_kernel_lib.py | ||
52 | 46 | ./scripts/test_usn_lib.py | ||
53 | 47 | ./scripts/check-cves --test | ||
54 | 48 | |||
55 | 49 | echo "Checking syntax..." | ||
56 | 50 | ./scripts/check-syntax | ||
57 | diff --git a/active/CVE-2021-33621 b/active/CVE-2021-33621 | |||
58 | index aef178b..eaecb69 100644 | |||
59 | --- a/active/CVE-2021-33621 | |||
60 | +++ b/active/CVE-2021-33621 | |||
61 | @@ -86,7 +86,7 @@ bionic_ruby3.0: DNE | |||
62 | 86 | focal_ruby3.0: DNE | 86 | focal_ruby3.0: DNE |
63 | 87 | jammy_ruby3.0: released (3.0.2-7ubuntu2.3) | 87 | jammy_ruby3.0: released (3.0.2-7ubuntu2.3) |
64 | 88 | kinetic_ruby3.0: released (3.0.4-7ubuntu0.1) | 88 | kinetic_ruby3.0: released (3.0.4-7ubuntu0.1) |
66 | 89 | devel_ruby3.0: released (3.0.4-8ubuntu1) | 89 | devel_ruby3.0: DNE |
67 | 90 | 90 | ||
68 | 91 | Patches_ruby3.1: | 91 | Patches_ruby3.1: |
69 | 92 | upstream_ruby3.1: released (3.1.2-4) | 92 | upstream_ruby3.1: released (3.1.2-4) |
70 | diff --git a/active/CVE-2021-3669 b/active/CVE-2021-3669 | |||
71 | index 7f48f42..0657603 100644 | |||
72 | --- a/active/CVE-2021-3669 | |||
73 | +++ b/active/CVE-2021-3669 | |||
74 | @@ -5,6 +5,7 @@ References: | |||
75 | 5 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669 | 5 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669 |
76 | 6 | https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/ | 6 | https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/ |
77 | 7 | https://ubuntu.com/security/notices/USN-5924-1 | 7 | https://ubuntu.com/security/notices/USN-5924-1 |
78 | 8 | https://ubuntu.com/security/notices/USN-5927-1 | ||
79 | 8 | Description: | 9 | Description: |
80 | 9 | A flaw was found in the Linux kernel. Measuring usage of the shared memory | 10 | A flaw was found in the Linux kernel. Measuring usage of the shared memory |
81 | 10 | does not scale with large shared memory segment counts which could lead to | 11 | does not scale with large shared memory segment counts which could lead to |
82 | @@ -222,7 +223,7 @@ upstream_linux-azure-4.15: released (5.15~rc1) | |||
83 | 222 | trusty_linux-azure-4.15: DNE | 223 | trusty_linux-azure-4.15: DNE |
84 | 223 | trusty/esm_linux-azure-4.15: DNE | 224 | trusty/esm_linux-azure-4.15: DNE |
85 | 224 | xenial_linux-azure-4.15: DNE | 225 | xenial_linux-azure-4.15: DNE |
87 | 225 | bionic_linux-azure-4.15: needed | 226 | bionic_linux-azure-4.15: released (4.15.0-1162.177) |
88 | 226 | focal_linux-azure-4.15: DNE | 227 | focal_linux-azure-4.15: DNE |
89 | 227 | hirsute_linux-azure-4.15: DNE | 228 | hirsute_linux-azure-4.15: DNE |
90 | 228 | impish_linux-azure-4.15: DNE | 229 | impish_linux-azure-4.15: DNE |
91 | diff --git a/active/CVE-2021-4155 b/active/CVE-2021-4155 | |||
92 | index 8055fd5..e60031b 100644 | |||
93 | --- a/active/CVE-2021-4155 | |||
94 | +++ b/active/CVE-2021-4155 | |||
95 | @@ -14,6 +14,7 @@ References: | |||
96 | 14 | https://ubuntu.com/security/notices/USN-5298-1 | 14 | https://ubuntu.com/security/notices/USN-5298-1 |
97 | 15 | https://ubuntu.com/security/notices/USN-5362-1 | 15 | https://ubuntu.com/security/notices/USN-5362-1 |
98 | 16 | https://ubuntu.com/security/notices/USN-5884-1 | 16 | https://ubuntu.com/security/notices/USN-5884-1 |
99 | 17 | https://ubuntu.com/security/notices/USN-5926-1 | ||
100 | 17 | Description: | 18 | Description: |
101 | 18 | A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS | 19 | A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS |
102 | 19 | filesystem allowed for size increase of files with unaligned size. A local | 20 | filesystem allowed for size increase of files with unaligned size. A local |
103 | @@ -40,7 +41,7 @@ upstream_linux: released (5.16) | |||
104 | 40 | trusty_linux: ignored (out of standard support) | 41 | trusty_linux: ignored (out of standard support) |
105 | 41 | trusty/esm_linux: ignored (was needed ESM criteria) | 42 | trusty/esm_linux: ignored (was needed ESM criteria) |
106 | 42 | xenial_linux: ignored (was needs-triage now end-of-life) | 43 | xenial_linux: ignored (was needs-triage now end-of-life) |
108 | 43 | esm-infra/xenial_linux: pending | 44 | esm-infra/xenial_linux: released (4.4.0-237.271) |
109 | 44 | bionic_linux: released (4.15.0-169.177) | 45 | bionic_linux: released (4.15.0-169.177) |
110 | 45 | focal_linux: released (5.4.0-100.113) | 46 | focal_linux: released (5.4.0-100.113) |
111 | 46 | hirsute_linux: ignored (reached end-of-life) | 47 | hirsute_linux: ignored (reached end-of-life) |
112 | @@ -120,7 +121,7 @@ devel_linux-hwe-edge: DNE | |||
113 | 120 | Patches_linux-lts-xenial: | 121 | Patches_linux-lts-xenial: |
114 | 121 | upstream_linux-lts-xenial: released (5.16) | 122 | upstream_linux-lts-xenial: released (5.16) |
115 | 122 | trusty_linux-lts-xenial: ignored (out of standard support) | 123 | trusty_linux-lts-xenial: ignored (out of standard support) |
117 | 123 | trusty/esm_linux-lts-xenial: pending | 124 | trusty/esm_linux-lts-xenial: released (4.4.0-237.271~14.04.1) |
118 | 124 | xenial_linux-lts-xenial: DNE | 125 | xenial_linux-lts-xenial: DNE |
119 | 125 | bionic_linux-lts-xenial: DNE | 126 | bionic_linux-lts-xenial: DNE |
120 | 126 | focal_linux-lts-xenial: DNE | 127 | focal_linux-lts-xenial: DNE |
121 | @@ -135,7 +136,7 @@ upstream_linux-kvm: released (5.16) | |||
122 | 135 | trusty_linux-kvm: DNE | 136 | trusty_linux-kvm: DNE |
123 | 136 | trusty/esm_linux-kvm: DNE | 137 | trusty/esm_linux-kvm: DNE |
124 | 137 | xenial_linux-kvm: ignored (was needs-triage now end-of-life) | 138 | xenial_linux-kvm: ignored (was needs-triage now end-of-life) |
126 | 138 | esm-infra/xenial_linux-kvm: pending | 139 | esm-infra/xenial_linux-kvm: released (4.4.0-1117.127) |
127 | 139 | bionic_linux-kvm: released (4.15.0-1107.109) | 140 | bionic_linux-kvm: released (4.15.0-1107.109) |
128 | 140 | focal_linux-kvm: released (5.4.0-1056.58) | 141 | focal_linux-kvm: released (5.4.0-1056.58) |
129 | 141 | hirsute_linux-kvm: ignored (reached end-of-life) | 142 | hirsute_linux-kvm: ignored (reached end-of-life) |
130 | @@ -147,7 +148,7 @@ devel_linux-kvm: not-affected (5.19.0-1008.8) | |||
131 | 147 | Patches_linux-aws: | 148 | Patches_linux-aws: |
132 | 148 | upstream_linux-aws: released (5.16) | 149 | upstream_linux-aws: released (5.16) |
133 | 149 | trusty_linux-aws: ignored (out of standard support) | 150 | trusty_linux-aws: ignored (out of standard support) |
135 | 150 | trusty/esm_linux-aws: pending | 151 | trusty/esm_linux-aws: released (4.4.0-1116.122) |
136 | 151 | xenial_linux-aws: ignored (was needs-triage now end-of-life) | 152 | xenial_linux-aws: ignored (was needs-triage now end-of-life) |
137 | 152 | esm-infra/xenial_linux-aws: released (4.4.0-1154.169) | 153 | esm-infra/xenial_linux-aws: released (4.4.0-1154.169) |
138 | 153 | bionic_linux-aws: released (4.15.0-1121.129) | 154 | bionic_linux-aws: released (4.15.0-1121.129) |
139 | diff --git a/active/CVE-2021-43618 b/active/CVE-2021-43618 | |||
140 | index 25d50fe..4902d72 100644 | |||
141 | --- a/active/CVE-2021-43618 | |||
142 | +++ b/active/CVE-2021-43618 | |||
143 | @@ -5,6 +5,7 @@ References: | |||
144 | 5 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618 | 5 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618 |
145 | 6 | https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html | 6 | https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html |
146 | 7 | https://ubuntu.com/security/notices/USN-5672-1 | 7 | https://ubuntu.com/security/notices/USN-5672-1 |
147 | 8 | https://ubuntu.com/security/notices/USN-5672-2 | ||
148 | 8 | Description: | 9 | Description: |
149 | 9 | GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an | 10 | GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an |
150 | 10 | mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted | 11 | mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted |
151 | @@ -25,7 +26,7 @@ CVSS: | |||
152 | 25 | Patches_gmp: | 26 | Patches_gmp: |
153 | 26 | upstream: https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e | 27 | upstream: https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e |
154 | 27 | upstream_gmp: released (2:6.2.1+dfsg-3) | 28 | upstream_gmp: released (2:6.2.1+dfsg-3) |
156 | 28 | trusty/esm_gmp: needs-triage | 29 | trusty/esm_gmp: released (2:5.1.3+dfsg-1ubuntu1+esm1) |
157 | 29 | esm-infra/xenial_gmp: released (2:6.1.0+dfsg-2ubuntu0.1~esm1) | 30 | esm-infra/xenial_gmp: released (2:6.1.0+dfsg-2ubuntu0.1~esm1) |
158 | 30 | trusty_gmp: ignored (out of standard support) | 31 | trusty_gmp: ignored (out of standard support) |
159 | 31 | xenial_gmp: ignored (out of standard support) | 32 | xenial_gmp: ignored (out of standard support) |
160 | diff --git a/active/CVE-2022-20566 b/active/CVE-2022-20566 | |||
161 | index f575cbc..5ad5008 100644 | |||
162 | --- a/active/CVE-2022-20566 | |||
163 | +++ b/active/CVE-2022-20566 | |||
164 | @@ -6,6 +6,7 @@ References: | |||
165 | 6 | https://git.kernel.org/linus/d0be8347c623e0ac4202a1d4e0373882821f56b0 | 6 | https://git.kernel.org/linus/d0be8347c623e0ac4202a1d4e0373882821f56b0 |
166 | 7 | https://ubuntu.com/security/notices/USN-5884-1 | 7 | https://ubuntu.com/security/notices/USN-5884-1 |
167 | 8 | https://ubuntu.com/security/notices/USN-5913-1 | 8 | https://ubuntu.com/security/notices/USN-5913-1 |
168 | 9 | https://ubuntu.com/security/notices/USN-5926-1 | ||
169 | 9 | Description: | 10 | Description: |
170 | 10 | In l2cap_chan_put of l2cap_core, there is a possible use after free due to | 11 | In l2cap_chan_put of l2cap_core, there is a possible use after free due to |
171 | 11 | improper locking. This could lead to local escalation of privilege with no | 12 | improper locking. This could lead to local escalation of privilege with no |
172 | @@ -29,7 +30,7 @@ CVSS: | |||
173 | 29 | Patches_linux: | 30 | Patches_linux: |
174 | 30 | break-fix: 4af66c691f4e5c2db9bb00793669a548e9db1974 d0be8347c623e0ac4202a1d4e0373882821f56b0 | 31 | break-fix: 4af66c691f4e5c2db9bb00793669a548e9db1974 d0be8347c623e0ac4202a1d4e0373882821f56b0 |
175 | 31 | upstream_linux: released (5.19) | 32 | upstream_linux: released (5.19) |
177 | 32 | esm-infra/xenial_linux: pending | 33 | esm-infra/xenial_linux: released (4.4.0-237.271) |
178 | 33 | trusty_linux: ignored (out of standard support) | 34 | trusty_linux: ignored (out of standard support) |
179 | 34 | xenial_linux: ignored (out of standard support) | 35 | xenial_linux: ignored (out of standard support) |
180 | 35 | bionic_linux: released (4.15.0-197.208) | 36 | bionic_linux: released (4.15.0-197.208) |
181 | @@ -112,11 +113,11 @@ bionic_linux-lts-xenial: DNE | |||
182 | 112 | focal_linux-lts-xenial: DNE | 113 | focal_linux-lts-xenial: DNE |
183 | 113 | jammy_linux-lts-xenial: DNE | 114 | jammy_linux-lts-xenial: DNE |
184 | 114 | kinetic_linux-lts-xenial: DNE | 115 | kinetic_linux-lts-xenial: DNE |
186 | 115 | trusty/esm_linux-lts-xenial: pending | 116 | trusty/esm_linux-lts-xenial: released (4.4.0-237.271~14.04.1) |
187 | 116 | 117 | ||
188 | 117 | Patches_linux-kvm: | 118 | Patches_linux-kvm: |
189 | 118 | upstream_linux-kvm: released (5.19) | 119 | upstream_linux-kvm: released (5.19) |
191 | 119 | esm-infra/xenial_linux-kvm: pending | 120 | esm-infra/xenial_linux-kvm: released (4.4.0-1117.127) |
192 | 120 | trusty_linux-kvm: DNE | 121 | trusty_linux-kvm: DNE |
193 | 121 | xenial_linux-kvm: ignored (end of standard support) | 122 | xenial_linux-kvm: ignored (end of standard support) |
194 | 122 | bionic_linux-kvm: released (4.15.0-1129.134) | 123 | bionic_linux-kvm: released (4.15.0-1129.134) |
195 | @@ -134,7 +135,7 @@ bionic_linux-aws: released (4.15.0-1143.155) | |||
196 | 134 | focal_linux-aws: released (5.4.0-1086.93) | 135 | focal_linux-aws: released (5.4.0-1086.93) |
197 | 135 | jammy_linux-aws: released (5.15.0-1021.25) | 136 | jammy_linux-aws: released (5.15.0-1021.25) |
198 | 136 | kinetic_linux-aws: not-affected (5.19.0-1005.5) | 137 | kinetic_linux-aws: not-affected (5.19.0-1005.5) |
200 | 137 | trusty/esm_linux-aws: pending | 138 | trusty/esm_linux-aws: released (4.4.0-1116.122) |
201 | 138 | devel_linux-aws: not-affected (5.19.0-1009.9) | 139 | devel_linux-aws: not-affected (5.19.0-1009.9) |
202 | 139 | 140 | ||
203 | 140 | Patches_linux-aws-5.0: | 141 | Patches_linux-aws-5.0: |
204 | diff --git a/active/CVE-2022-3424 b/active/CVE-2022-3424 | |||
205 | index ea31238..1bb5db9 100644 | |||
206 | --- a/active/CVE-2022-3424 | |||
207 | +++ b/active/CVE-2022-3424 | |||
208 | @@ -8,6 +8,7 @@ References: | |||
209 | 8 | https://ubuntu.com/security/notices/USN-5856-1 | 8 | https://ubuntu.com/security/notices/USN-5856-1 |
210 | 9 | https://ubuntu.com/security/notices/USN-5917-1 | 9 | https://ubuntu.com/security/notices/USN-5917-1 |
211 | 10 | https://ubuntu.com/security/notices/USN-5924-1 | 10 | https://ubuntu.com/security/notices/USN-5924-1 |
212 | 11 | https://ubuntu.com/security/notices/USN-5927-1 | ||
213 | 11 | Description: | 12 | Description: |
214 | 12 | [misc: sgi-gru: fix use-after-free error in gru_set_context_option, | 13 | [misc: sgi-gru: fix use-after-free error in gru_set_context_option, |
215 | 13 | gru_fault and gru_handle_user_call_os] | 14 | gru_fault and gru_handle_user_call_os] |
216 | @@ -211,7 +212,7 @@ Patches_linux-azure-4.15: | |||
217 | 211 | upstream_linux-azure-4.15: needs-triage | 212 | upstream_linux-azure-4.15: needs-triage |
218 | 212 | trusty_linux-azure-4.15: DNE | 213 | trusty_linux-azure-4.15: DNE |
219 | 213 | xenial_linux-azure-4.15: DNE | 214 | xenial_linux-azure-4.15: DNE |
221 | 214 | bionic_linux-azure-4.15: needs-triage | 215 | bionic_linux-azure-4.15: released (4.15.0-1162.177) |
222 | 215 | focal_linux-azure-4.15: DNE | 216 | focal_linux-azure-4.15: DNE |
223 | 216 | jammy_linux-azure-4.15: DNE | 217 | jammy_linux-azure-4.15: DNE |
224 | 217 | 218 | ||
225 | diff --git a/active/CVE-2022-3521 b/active/CVE-2022-3521 | |||
226 | index 2791905..05e5e37 100644 | |||
227 | --- a/active/CVE-2022-3521 | |||
228 | +++ b/active/CVE-2022-3521 | |||
229 | @@ -11,6 +11,8 @@ References: | |||
230 | 11 | https://ubuntu.com/security/notices/USN-5919-1 | 11 | https://ubuntu.com/security/notices/USN-5919-1 |
231 | 12 | https://ubuntu.com/security/notices/USN-5920-1 | 12 | https://ubuntu.com/security/notices/USN-5920-1 |
232 | 13 | https://ubuntu.com/security/notices/USN-5924-1 | 13 | https://ubuntu.com/security/notices/USN-5924-1 |
233 | 14 | https://ubuntu.com/security/notices/USN-5925-1 | ||
234 | 15 | https://ubuntu.com/security/notices/USN-5927-1 | ||
235 | 14 | Description: | 16 | Description: |
236 | 15 | A vulnerability has been found in Linux Kernel and classified as | 17 | A vulnerability has been found in Linux Kernel and classified as |
237 | 16 | problematic. This vulnerability affects the function kcm_tx_work of the | 18 | problematic. This vulnerability affects the function kcm_tx_work of the |
238 | @@ -132,7 +134,7 @@ upstream_linux-kvm: needs-triage | |||
239 | 132 | esm-infra/xenial_linux-kvm: needs-triage | 134 | esm-infra/xenial_linux-kvm: needs-triage |
240 | 133 | trusty_linux-kvm: DNE | 135 | trusty_linux-kvm: DNE |
241 | 134 | xenial_linux-kvm: ignored (end of standard support) | 136 | xenial_linux-kvm: ignored (end of standard support) |
243 | 135 | bionic_linux-kvm: needs-triage | 137 | bionic_linux-kvm: released (4.15.0-1136.141) |
244 | 136 | focal_linux-kvm: released (5.4.0-1087.93) | 138 | focal_linux-kvm: released (5.4.0-1087.93) |
245 | 137 | jammy_linux-kvm: needs-triage | 139 | jammy_linux-kvm: needs-triage |
246 | 138 | kinetic_linux-kvm: needs-triage | 140 | kinetic_linux-kvm: needs-triage |
247 | @@ -247,7 +249,7 @@ Patches_linux-azure-4.15: | |||
248 | 247 | upstream_linux-azure-4.15: needs-triage | 249 | upstream_linux-azure-4.15: needs-triage |
249 | 248 | trusty_linux-azure-4.15: DNE | 250 | trusty_linux-azure-4.15: DNE |
250 | 249 | xenial_linux-azure-4.15: DNE | 251 | xenial_linux-azure-4.15: DNE |
252 | 250 | bionic_linux-azure-4.15: needs-triage | 252 | bionic_linux-azure-4.15: released (4.15.0-1162.177) |
253 | 251 | focal_linux-azure-4.15: DNE | 253 | focal_linux-azure-4.15: DNE |
254 | 252 | jammy_linux-azure-4.15: DNE | 254 | jammy_linux-azure-4.15: DNE |
255 | 253 | kinetic_linux-azure-4.15: DNE | 255 | kinetic_linux-azure-4.15: DNE |
256 | @@ -776,7 +778,7 @@ Patches_linux-raspi2: | |||
257 | 776 | upstream_linux-raspi2: needs-triage | 778 | upstream_linux-raspi2: needs-triage |
258 | 777 | trusty_linux-raspi2: DNE | 779 | trusty_linux-raspi2: DNE |
259 | 778 | xenial_linux-raspi2: ignored (end of standard support) | 780 | xenial_linux-raspi2: ignored (end of standard support) |
261 | 779 | bionic_linux-raspi2: needs-triage | 781 | bionic_linux-raspi2: released (4.15.0-1128.136) |
262 | 780 | esm-apps/bionic_linux-raspi2: needs-triage | 782 | esm-apps/bionic_linux-raspi2: needs-triage |
263 | 781 | focal_linux-raspi2: ignored (replaced by linux-raspi) | 783 | focal_linux-raspi2: ignored (replaced by linux-raspi) |
264 | 782 | jammy_linux-raspi2: DNE | 784 | jammy_linux-raspi2: DNE |
265 | @@ -838,7 +840,7 @@ Patches_linux-snapdragon: | |||
266 | 838 | upstream_linux-snapdragon: needs-triage | 840 | upstream_linux-snapdragon: needs-triage |
267 | 839 | trusty_linux-snapdragon: DNE | 841 | trusty_linux-snapdragon: DNE |
268 | 840 | xenial_linux-snapdragon: ignored (end of standard support) | 842 | xenial_linux-snapdragon: ignored (end of standard support) |
270 | 841 | bionic_linux-snapdragon: needs-triage | 843 | bionic_linux-snapdragon: released (4.15.0-1146.156) |
271 | 842 | focal_linux-snapdragon: DNE | 844 | focal_linux-snapdragon: DNE |
272 | 843 | jammy_linux-snapdragon: DNE | 845 | jammy_linux-snapdragon: DNE |
273 | 844 | kinetic_linux-snapdragon: DNE | 846 | kinetic_linux-snapdragon: DNE |
274 | diff --git a/active/CVE-2022-3545 b/active/CVE-2022-3545 | |||
275 | index 27e663c..c88389c 100644 | |||
276 | --- a/active/CVE-2022-3545 | |||
277 | +++ b/active/CVE-2022-3545 | |||
278 | @@ -13,6 +13,8 @@ References: | |||
279 | 13 | https://ubuntu.com/security/notices/USN-5919-1 | 13 | https://ubuntu.com/security/notices/USN-5919-1 |
280 | 14 | https://ubuntu.com/security/notices/USN-5920-1 | 14 | https://ubuntu.com/security/notices/USN-5920-1 |
281 | 15 | https://ubuntu.com/security/notices/USN-5924-1 | 15 | https://ubuntu.com/security/notices/USN-5924-1 |
282 | 16 | https://ubuntu.com/security/notices/USN-5925-1 | ||
283 | 17 | https://ubuntu.com/security/notices/USN-5927-1 | ||
284 | 16 | Description: | 18 | Description: |
285 | 17 | A vulnerability has been found in Linux Kernel and classified as critical. | 19 | A vulnerability has been found in Linux Kernel and classified as critical. |
286 | 18 | Affected by this vulnerability is the function area_cache_get of the file | 20 | Affected by this vulnerability is the function area_cache_get of the file |
287 | @@ -135,7 +137,7 @@ upstream_linux-kvm: released (6.0~rc1) | |||
288 | 135 | esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9) | 137 | esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9) |
289 | 136 | trusty_linux-kvm: DNE | 138 | trusty_linux-kvm: DNE |
290 | 137 | xenial_linux-kvm: ignored (end of standard support) | 139 | xenial_linux-kvm: ignored (end of standard support) |
292 | 138 | bionic_linux-kvm: pending (4.15.0-1136.141) | 140 | bionic_linux-kvm: released (4.15.0-1136.141) |
293 | 139 | focal_linux-kvm: released (5.4.0-1087.93) | 141 | focal_linux-kvm: released (5.4.0-1087.93) |
294 | 140 | jammy_linux-kvm: pending (5.15.0-1029.34) | 142 | jammy_linux-kvm: pending (5.15.0-1029.34) |
295 | 141 | kinetic_linux-kvm: pending (5.19.0-1019.20) | 143 | kinetic_linux-kvm: pending (5.19.0-1019.20) |
296 | @@ -250,7 +252,7 @@ Patches_linux-azure-4.15: | |||
297 | 250 | upstream_linux-azure-4.15: released (6.0~rc1) | 252 | upstream_linux-azure-4.15: released (6.0~rc1) |
298 | 251 | trusty_linux-azure-4.15: DNE | 253 | trusty_linux-azure-4.15: DNE |
299 | 252 | xenial_linux-azure-4.15: DNE | 254 | xenial_linux-azure-4.15: DNE |
301 | 253 | bionic_linux-azure-4.15: needed | 255 | bionic_linux-azure-4.15: released (4.15.0-1162.177) |
302 | 254 | focal_linux-azure-4.15: DNE | 256 | focal_linux-azure-4.15: DNE |
303 | 255 | jammy_linux-azure-4.15: DNE | 257 | jammy_linux-azure-4.15: DNE |
304 | 256 | kinetic_linux-azure-4.15: DNE | 258 | kinetic_linux-azure-4.15: DNE |
305 | @@ -779,7 +781,7 @@ Patches_linux-raspi2: | |||
306 | 779 | upstream_linux-raspi2: released (6.0~rc1) | 781 | upstream_linux-raspi2: released (6.0~rc1) |
307 | 780 | trusty_linux-raspi2: DNE | 782 | trusty_linux-raspi2: DNE |
308 | 781 | xenial_linux-raspi2: ignored (end of standard support) | 783 | xenial_linux-raspi2: ignored (end of standard support) |
310 | 782 | bionic_linux-raspi2: pending (4.15.0-1128.136) | 784 | bionic_linux-raspi2: released (4.15.0-1128.136) |
311 | 783 | esm-apps/bionic_linux-raspi2: needed | 785 | esm-apps/bionic_linux-raspi2: needed |
312 | 784 | focal_linux-raspi2: ignored (replaced by linux-raspi) | 786 | focal_linux-raspi2: ignored (replaced by linux-raspi) |
313 | 785 | jammy_linux-raspi2: DNE | 787 | jammy_linux-raspi2: DNE |
314 | @@ -841,7 +843,7 @@ Patches_linux-snapdragon: | |||
315 | 841 | upstream_linux-snapdragon: released (6.0~rc1) | 843 | upstream_linux-snapdragon: released (6.0~rc1) |
316 | 842 | trusty_linux-snapdragon: DNE | 844 | trusty_linux-snapdragon: DNE |
317 | 843 | xenial_linux-snapdragon: ignored (end of standard support) | 845 | xenial_linux-snapdragon: ignored (end of standard support) |
319 | 844 | bionic_linux-snapdragon: pending (4.15.0-1146.156) | 846 | bionic_linux-snapdragon: released (4.15.0-1146.156) |
320 | 845 | focal_linux-snapdragon: DNE | 847 | focal_linux-snapdragon: DNE |
321 | 846 | jammy_linux-snapdragon: DNE | 848 | jammy_linux-snapdragon: DNE |
322 | 847 | kinetic_linux-snapdragon: DNE | 849 | kinetic_linux-snapdragon: DNE |
323 | diff --git a/active/CVE-2022-3628 b/active/CVE-2022-3628 | |||
324 | index 58f8389..b7d9fda 100644 | |||
325 | --- a/active/CVE-2022-3628 | |||
326 | +++ b/active/CVE-2022-3628 | |||
327 | @@ -22,6 +22,8 @@ References: | |||
328 | 22 | https://ubuntu.com/security/notices/USN-5919-1 | 22 | https://ubuntu.com/security/notices/USN-5919-1 |
329 | 23 | https://ubuntu.com/security/notices/USN-5920-1 | 23 | https://ubuntu.com/security/notices/USN-5920-1 |
330 | 24 | https://ubuntu.com/security/notices/USN-5924-1 | 24 | https://ubuntu.com/security/notices/USN-5924-1 |
331 | 25 | https://ubuntu.com/security/notices/USN-5925-1 | ||
332 | 26 | https://ubuntu.com/security/notices/USN-5927-1 | ||
333 | 25 | Description: | 27 | Description: |
334 | 26 | A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC | 28 | A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC |
335 | 27 | Wi-Fi driver. This issue occurs when a user connects to a malicious USB | 29 | Wi-Fi driver. This issue occurs when a user connects to a malicious USB |
336 | @@ -135,7 +137,7 @@ upstream_linux-kvm: released (6.1~rc5) | |||
337 | 135 | esm-infra/xenial_linux-kvm: ignored (was needed ESM criteria) | 137 | esm-infra/xenial_linux-kvm: ignored (was needed ESM criteria) |
338 | 136 | trusty_linux-kvm: DNE | 138 | trusty_linux-kvm: DNE |
339 | 137 | xenial_linux-kvm: ignored (end of standard support) | 139 | xenial_linux-kvm: ignored (end of standard support) |
341 | 138 | bionic_linux-kvm: needed | 140 | bionic_linux-kvm: released (4.15.0-1136.141) |
342 | 139 | focal_linux-kvm: released (5.4.0-1086.92) | 141 | focal_linux-kvm: released (5.4.0-1086.92) |
343 | 140 | jammy_linux-kvm: released (5.15.0-1028.33) | 142 | jammy_linux-kvm: released (5.15.0-1028.33) |
344 | 141 | kinetic_linux-kvm: released (5.19.0-1018.19) | 143 | kinetic_linux-kvm: released (5.19.0-1018.19) |
345 | @@ -242,7 +244,7 @@ Patches_linux-azure-4.15: | |||
346 | 242 | upstream_linux-azure-4.15: released (6.1~rc5) | 244 | upstream_linux-azure-4.15: released (6.1~rc5) |
347 | 243 | trusty_linux-azure-4.15: DNE | 245 | trusty_linux-azure-4.15: DNE |
348 | 244 | xenial_linux-azure-4.15: DNE | 246 | xenial_linux-azure-4.15: DNE |
350 | 245 | bionic_linux-azure-4.15: needed | 247 | bionic_linux-azure-4.15: released (4.15.0-1162.177) |
351 | 246 | focal_linux-azure-4.15: DNE | 248 | focal_linux-azure-4.15: DNE |
352 | 247 | jammy_linux-azure-4.15: DNE | 249 | jammy_linux-azure-4.15: DNE |
353 | 248 | kinetic_linux-azure-4.15: DNE | 250 | kinetic_linux-azure-4.15: DNE |
354 | @@ -725,7 +727,7 @@ Patches_linux-raspi2: | |||
355 | 725 | upstream_linux-raspi2: released (6.1~rc5) | 727 | upstream_linux-raspi2: released (6.1~rc5) |
356 | 726 | trusty_linux-raspi2: DNE | 728 | trusty_linux-raspi2: DNE |
357 | 727 | xenial_linux-raspi2: ignored (end of standard support) | 729 | xenial_linux-raspi2: ignored (end of standard support) |
359 | 728 | bionic_linux-raspi2: needed | 730 | bionic_linux-raspi2: released (4.15.0-1128.136) |
360 | 729 | esm-apps/bionic_linux-raspi2: needs-triage | 731 | esm-apps/bionic_linux-raspi2: needs-triage |
361 | 730 | focal_linux-raspi2: ignored (replaced by linux-raspi) | 732 | focal_linux-raspi2: ignored (replaced by linux-raspi) |
362 | 731 | jammy_linux-raspi2: DNE | 733 | jammy_linux-raspi2: DNE |
363 | @@ -782,7 +784,7 @@ Patches_linux-snapdragon: | |||
364 | 782 | upstream_linux-snapdragon: released (6.1~rc5) | 784 | upstream_linux-snapdragon: released (6.1~rc5) |
365 | 783 | trusty_linux-snapdragon: DNE | 785 | trusty_linux-snapdragon: DNE |
366 | 784 | xenial_linux-snapdragon: ignored (end of standard support) | 786 | xenial_linux-snapdragon: ignored (end of standard support) |
368 | 785 | bionic_linux-snapdragon: needed | 787 | bionic_linux-snapdragon: released (4.15.0-1146.156) |
369 | 786 | focal_linux-snapdragon: DNE | 788 | focal_linux-snapdragon: DNE |
370 | 787 | jammy_linux-snapdragon: DNE | 789 | jammy_linux-snapdragon: DNE |
371 | 788 | kinetic_linux-snapdragon: DNE | 790 | kinetic_linux-snapdragon: DNE |
372 | diff --git a/active/CVE-2022-36280 b/active/CVE-2022-36280 | |||
373 | index 6485f01..f5d54e7 100644 | |||
374 | --- a/active/CVE-2022-36280 | |||
375 | +++ b/active/CVE-2022-36280 | |||
376 | @@ -6,6 +6,7 @@ References: | |||
377 | 6 | https://ubuntu.com/security/notices/USN-5915-1 | 6 | https://ubuntu.com/security/notices/USN-5915-1 |
378 | 7 | https://ubuntu.com/security/notices/USN-5917-1 | 7 | https://ubuntu.com/security/notices/USN-5917-1 |
379 | 8 | https://ubuntu.com/security/notices/USN-5924-1 | 8 | https://ubuntu.com/security/notices/USN-5924-1 |
380 | 9 | https://ubuntu.com/security/notices/USN-5927-1 | ||
381 | 9 | Description: | 10 | Description: |
382 | 10 | An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx | 11 | An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx |
383 | 11 | driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux | 12 | driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux |
384 | @@ -133,7 +134,7 @@ Patches_linux-azure-4.15: | |||
385 | 133 | upstream_linux-azure-4.15: needs-triage | 134 | upstream_linux-azure-4.15: needs-triage |
386 | 134 | trusty_linux-azure-4.15: ignored (out of standard support) | 135 | trusty_linux-azure-4.15: ignored (out of standard support) |
387 | 135 | xenial_linux-azure-4.15: ignored (out of standard support) | 136 | xenial_linux-azure-4.15: ignored (out of standard support) |
389 | 136 | bionic_linux-azure-4.15: needs-triage | 137 | bionic_linux-azure-4.15: released (4.15.0-1162.177) |
390 | 137 | focal_linux-azure-4.15: DNE | 138 | focal_linux-azure-4.15: DNE |
391 | 138 | jammy_linux-azure-4.15: DNE | 139 | jammy_linux-azure-4.15: DNE |
392 | 139 | 140 | ||
393 | diff --git a/active/CVE-2022-3640 b/active/CVE-2022-3640 | |||
394 | index 30375e2..35a1f63 100644 | |||
395 | --- a/active/CVE-2022-3640 | |||
396 | +++ b/active/CVE-2022-3640 | |||
397 | @@ -21,6 +21,8 @@ References: | |||
398 | 21 | https://ubuntu.com/security/notices/USN-5919-1 | 21 | https://ubuntu.com/security/notices/USN-5919-1 |
399 | 22 | https://ubuntu.com/security/notices/USN-5920-1 | 22 | https://ubuntu.com/security/notices/USN-5920-1 |
400 | 23 | https://ubuntu.com/security/notices/USN-5924-1 | 23 | https://ubuntu.com/security/notices/USN-5924-1 |
401 | 24 | https://ubuntu.com/security/notices/USN-5925-1 | ||
402 | 25 | https://ubuntu.com/security/notices/USN-5927-1 | ||
403 | 24 | Description: | 26 | Description: |
404 | 25 | A vulnerability, which was classified as critical, was found in Linux | 27 | A vulnerability, which was classified as critical, was found in Linux |
405 | 26 | Kernel. Affected is the function l2cap_conn_del of the file | 28 | Kernel. Affected is the function l2cap_conn_del of the file |
406 | @@ -128,7 +130,7 @@ upstream_linux-kvm: needed | |||
407 | 128 | esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9) | 130 | esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9) |
408 | 129 | trusty_linux-kvm: DNE | 131 | trusty_linux-kvm: DNE |
409 | 130 | xenial_linux-kvm: ignored (end of standard support) | 132 | xenial_linux-kvm: ignored (end of standard support) |
411 | 131 | bionic_linux-kvm: needed | 133 | bionic_linux-kvm: released (4.15.0-1136.141) |
412 | 132 | focal_linux-kvm: released (5.4.0-1086.92) | 134 | focal_linux-kvm: released (5.4.0-1086.92) |
413 | 133 | jammy_linux-kvm: released (5.15.0-1028.33) | 135 | jammy_linux-kvm: released (5.15.0-1028.33) |
414 | 134 | kinetic_linux-kvm: released (5.19.0-1018.19) | 136 | kinetic_linux-kvm: released (5.19.0-1018.19) |
415 | @@ -227,7 +229,7 @@ Patches_linux-azure-4.15: | |||
416 | 227 | upstream_linux-azure-4.15: needed | 229 | upstream_linux-azure-4.15: needed |
417 | 228 | trusty_linux-azure-4.15: DNE | 230 | trusty_linux-azure-4.15: DNE |
418 | 229 | xenial_linux-azure-4.15: DNE | 231 | xenial_linux-azure-4.15: DNE |
420 | 230 | bionic_linux-azure-4.15: needed | 232 | bionic_linux-azure-4.15: released (4.15.0-1162.177) |
421 | 231 | focal_linux-azure-4.15: DNE | 233 | focal_linux-azure-4.15: DNE |
422 | 232 | jammy_linux-azure-4.15: DNE | 234 | jammy_linux-azure-4.15: DNE |
423 | 233 | 235 | ||
424 | @@ -656,7 +658,7 @@ Patches_linux-raspi2: | |||
425 | 656 | upstream_linux-raspi2: needed | 658 | upstream_linux-raspi2: needed |
426 | 657 | trusty_linux-raspi2: DNE | 659 | trusty_linux-raspi2: DNE |
427 | 658 | xenial_linux-raspi2: ignored (end of standard support) | 660 | xenial_linux-raspi2: ignored (end of standard support) |
429 | 659 | bionic_linux-raspi2: needed | 661 | bionic_linux-raspi2: released (4.15.0-1128.136) |
430 | 660 | esm-apps/bionic_linux-raspi2: needed | 662 | esm-apps/bionic_linux-raspi2: needed |
431 | 661 | focal_linux-raspi2: ignored (replaced by linux-raspi) | 663 | focal_linux-raspi2: ignored (replaced by linux-raspi) |
432 | 662 | jammy_linux-raspi2: DNE | 664 | jammy_linux-raspi2: DNE |
433 | @@ -708,7 +710,7 @@ Patches_linux-snapdragon: | |||
434 | 708 | upstream_linux-snapdragon: needed | 710 | upstream_linux-snapdragon: needed |
435 | 709 | trusty_linux-snapdragon: DNE | 711 | trusty_linux-snapdragon: DNE |
436 | 710 | xenial_linux-snapdragon: ignored (end of standard support) | 712 | xenial_linux-snapdragon: ignored (end of standard support) |
438 | 711 | bionic_linux-snapdragon: needed | 713 | bionic_linux-snapdragon: released (4.15.0-1146.156) |
439 | 712 | focal_linux-snapdragon: DNE | 714 | focal_linux-snapdragon: DNE |
440 | 713 | jammy_linux-snapdragon: DNE | 715 | jammy_linux-snapdragon: DNE |
441 | 714 | 716 | ||
442 | diff --git a/active/CVE-2022-41218 b/active/CVE-2022-41218 | |||
443 | index e0c106e..b9dc071 100644 | |||
444 | --- a/active/CVE-2022-41218 | |||
445 | +++ b/active/CVE-2022-41218 | |||
446 | @@ -13,6 +13,7 @@ References: | |||
447 | 13 | https://ubuntu.com/security/notices/USN-5915-1 | 13 | https://ubuntu.com/security/notices/USN-5915-1 |
448 | 14 | https://ubuntu.com/security/notices/USN-5917-1 | 14 | https://ubuntu.com/security/notices/USN-5917-1 |
449 | 15 | https://ubuntu.com/security/notices/USN-5924-1 | 15 | https://ubuntu.com/security/notices/USN-5924-1 |
450 | 16 | https://ubuntu.com/security/notices/USN-5927-1 | ||
451 | 16 | Description: | 17 | Description: |
452 | 17 | In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, | 18 | In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, |
453 | 18 | there is a use-after-free caused by refcount races, affecting | 19 | there is a use-after-free caused by refcount races, affecting |
454 | @@ -215,7 +216,7 @@ Patches_linux-azure-4.15: | |||
455 | 215 | upstream_linux-azure-4.15: needs-triage | 216 | upstream_linux-azure-4.15: needs-triage |
456 | 216 | trusty_linux-azure-4.15: DNE | 217 | trusty_linux-azure-4.15: DNE |
457 | 217 | xenial_linux-azure-4.15: DNE | 218 | xenial_linux-azure-4.15: DNE |
459 | 218 | bionic_linux-azure-4.15: needs-triage | 219 | bionic_linux-azure-4.15: released (4.15.0-1162.177) |
460 | 219 | focal_linux-azure-4.15: DNE | 220 | focal_linux-azure-4.15: DNE |
461 | 220 | jammy_linux-azure-4.15: DNE | 221 | jammy_linux-azure-4.15: DNE |
462 | 221 | 222 | ||
463 | diff --git a/active/CVE-2022-41858 b/active/CVE-2022-41858 | |||
464 | index de076ee..e5f48cb 100644 | |||
465 | --- a/active/CVE-2022-41858 | |||
466 | +++ b/active/CVE-2022-41858 | |||
467 | @@ -6,6 +6,7 @@ References: | |||
468 | 6 | https://git.kernel.org/linus/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798 (5.18-rc2) | 6 | https://git.kernel.org/linus/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798 (5.18-rc2) |
469 | 7 | https://access.redhat.com/security/cve/CVE-2022-41858 | 7 | https://access.redhat.com/security/cve/CVE-2022-41858 |
470 | 8 | https://ubuntu.com/security/notices/USN-5884-1 | 8 | https://ubuntu.com/security/notices/USN-5884-1 |
471 | 9 | https://ubuntu.com/security/notices/USN-5926-1 | ||
472 | 9 | Description: | 10 | Description: |
473 | 10 | A flaw was found in the Linux kernel. A NULL pointer dereference may occur | 11 | A flaw was found in the Linux kernel. A NULL pointer dereference may occur |
474 | 11 | while a slip driver is in progress to detach in sl_tx_timeout in | 12 | while a slip driver is in progress to detach in sl_tx_timeout in |
475 | @@ -27,7 +28,7 @@ CVSS: | |||
476 | 27 | Patches_linux: | 28 | Patches_linux: |
477 | 28 | break-fix: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 ec4eb8a86ade4d22633e1da2a7d85a846b7d1798 | 29 | break-fix: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 ec4eb8a86ade4d22633e1da2a7d85a846b7d1798 |
478 | 29 | upstream_linux: released (5.18~rc2) | 30 | upstream_linux: released (5.18~rc2) |
480 | 30 | esm-infra/xenial_linux: pending | 31 | esm-infra/xenial_linux: released (4.4.0-237.271) |
481 | 31 | trusty_linux: ignored (out of standard support) | 32 | trusty_linux: ignored (out of standard support) |
482 | 32 | xenial_linux: ignored (out of standard support) | 33 | xenial_linux: ignored (out of standard support) |
483 | 33 | bionic_linux: released (4.15.0-189.200) | 34 | bionic_linux: released (4.15.0-189.200) |
484 | @@ -110,11 +111,11 @@ bionic_linux-lts-xenial: DNE | |||
485 | 110 | focal_linux-lts-xenial: DNE | 111 | focal_linux-lts-xenial: DNE |
486 | 111 | jammy_linux-lts-xenial: DNE | 112 | jammy_linux-lts-xenial: DNE |
487 | 112 | kinetic_linux-lts-xenial: DNE | 113 | kinetic_linux-lts-xenial: DNE |
489 | 113 | trusty/esm_linux-lts-xenial: pending | 114 | trusty/esm_linux-lts-xenial: released (4.4.0-237.271~14.04.1) |
490 | 114 | 115 | ||
491 | 115 | Patches_linux-kvm: | 116 | Patches_linux-kvm: |
492 | 116 | upstream_linux-kvm: released (5.18~rc2) | 117 | upstream_linux-kvm: released (5.18~rc2) |
494 | 117 | esm-infra/xenial_linux-kvm: pending | 118 | esm-infra/xenial_linux-kvm: released (4.4.0-1117.127) |
495 | 118 | trusty_linux-kvm: DNE | 119 | trusty_linux-kvm: DNE |
496 | 119 | xenial_linux-kvm: ignored (end of standard support) | 120 | xenial_linux-kvm: ignored (end of standard support) |
497 | 120 | bionic_linux-kvm: released (4.15.0-1123.128) | 121 | bionic_linux-kvm: released (4.15.0-1123.128) |
498 | @@ -132,7 +133,7 @@ bionic_linux-aws: released (4.15.0-1137.148) | |||
499 | 132 | focal_linux-aws: released (5.4.0-1081.88) | 133 | focal_linux-aws: released (5.4.0-1081.88) |
500 | 133 | jammy_linux-aws: released (5.15.0-1009.11) | 134 | jammy_linux-aws: released (5.15.0-1009.11) |
501 | 134 | kinetic_linux-aws: not-affected (5.19.0-1005.5) | 135 | kinetic_linux-aws: not-affected (5.19.0-1005.5) |
503 | 135 | trusty/esm_linux-aws: pending | 136 | trusty/esm_linux-aws: released (4.4.0-1116.122) |
504 | 136 | devel_linux-aws: not-affected (5.19.0-1009.9) | 137 | devel_linux-aws: not-affected (5.19.0-1009.9) |
505 | 137 | 138 | ||
506 | 138 | Patches_linux-aws-5.0: | 139 | Patches_linux-aws-5.0: |
507 | diff --git a/active/CVE-2022-42328 b/active/CVE-2022-42328 | |||
508 | index db4ffc3..ce43ece 100644 | |||
509 | --- a/active/CVE-2022-42328 | |||
510 | +++ b/active/CVE-2022-42328 | |||
511 | @@ -12,6 +12,8 @@ References: | |||
512 | 12 | https://ubuntu.com/security/notices/USN-5919-1 | 12 | https://ubuntu.com/security/notices/USN-5919-1 |
513 | 13 | https://ubuntu.com/security/notices/USN-5920-1 | 13 | https://ubuntu.com/security/notices/USN-5920-1 |
514 | 14 | https://ubuntu.com/security/notices/USN-5924-1 | 14 | https://ubuntu.com/security/notices/USN-5924-1 |
515 | 15 | https://ubuntu.com/security/notices/USN-5925-1 | ||
516 | 16 | https://ubuntu.com/security/notices/USN-5927-1 | ||
517 | 15 | Description: | 17 | Description: |
518 | 16 | Guests can trigger deadlock in Linux netback driver T[his CNA information | 18 | Guests can trigger deadlock in Linux netback driver T[his CNA information |
519 | 17 | record relates to multiple CVEs; the text explains which | 19 | record relates to multiple CVEs; the text explains which |
520 | @@ -128,7 +130,7 @@ upstream_linux-kvm: released (6.1) | |||
521 | 128 | esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9) | 130 | esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9) |
522 | 129 | trusty_linux-kvm: DNE | 131 | trusty_linux-kvm: DNE |
523 | 130 | xenial_linux-kvm: ignored (end of standard support) | 132 | xenial_linux-kvm: ignored (end of standard support) |
525 | 131 | bionic_linux-kvm: pending (4.15.0-1136.141) | 133 | bionic_linux-kvm: released (4.15.0-1136.141) |
526 | 132 | focal_linux-kvm: released (5.4.0-1087.93) | 134 | focal_linux-kvm: released (5.4.0-1087.93) |
527 | 133 | jammy_linux-kvm: pending (5.15.0-1029.34) | 135 | jammy_linux-kvm: pending (5.15.0-1029.34) |
528 | 134 | kinetic_linux-kvm: needed | 136 | kinetic_linux-kvm: needed |
529 | @@ -235,7 +237,7 @@ Patches_linux-azure-4.15: | |||
530 | 235 | upstream_linux-azure-4.15: released (6.1) | 237 | upstream_linux-azure-4.15: released (6.1) |
531 | 236 | trusty_linux-azure-4.15: DNE | 238 | trusty_linux-azure-4.15: DNE |
532 | 237 | xenial_linux-azure-4.15: DNE | 239 | xenial_linux-azure-4.15: DNE |
534 | 238 | bionic_linux-azure-4.15: needed | 240 | bionic_linux-azure-4.15: released (4.15.0-1162.177) |
535 | 239 | focal_linux-azure-4.15: DNE | 241 | focal_linux-azure-4.15: DNE |
536 | 240 | jammy_linux-azure-4.15: DNE | 242 | jammy_linux-azure-4.15: DNE |
537 | 241 | kinetic_linux-azure-4.15: DNE | 243 | kinetic_linux-azure-4.15: DNE |
538 | @@ -718,7 +720,7 @@ Patches_linux-raspi2: | |||
539 | 718 | upstream_linux-raspi2: released (6.1) | 720 | upstream_linux-raspi2: released (6.1) |
540 | 719 | trusty_linux-raspi2: DNE | 721 | trusty_linux-raspi2: DNE |
541 | 720 | xenial_linux-raspi2: ignored (end of standard support) | 722 | xenial_linux-raspi2: ignored (end of standard support) |
543 | 721 | bionic_linux-raspi2: pending (4.15.0-1128.136) | 723 | bionic_linux-raspi2: released (4.15.0-1128.136) |
544 | 722 | esm-apps/bionic_linux-raspi2: needs-triage | 724 | esm-apps/bionic_linux-raspi2: needs-triage |
545 | 723 | focal_linux-raspi2: ignored (replaced by linux-raspi) | 725 | focal_linux-raspi2: ignored (replaced by linux-raspi) |
546 | 724 | jammy_linux-raspi2: DNE | 726 | jammy_linux-raspi2: DNE |
547 | @@ -775,7 +777,7 @@ Patches_linux-snapdragon: | |||
548 | 775 | upstream_linux-snapdragon: released (6.1) | 777 | upstream_linux-snapdragon: released (6.1) |
549 | 776 | trusty_linux-snapdragon: DNE | 778 | trusty_linux-snapdragon: DNE |
550 | 777 | xenial_linux-snapdragon: ignored (end of standard support) | 779 | xenial_linux-snapdragon: ignored (end of standard support) |
552 | 778 | bionic_linux-snapdragon: pending (4.15.0-1146.156) | 780 | bionic_linux-snapdragon: released (4.15.0-1146.156) |
553 | 779 | focal_linux-snapdragon: DNE | 781 | focal_linux-snapdragon: DNE |
554 | 780 | jammy_linux-snapdragon: DNE | 782 | jammy_linux-snapdragon: DNE |
555 | 781 | kinetic_linux-snapdragon: DNE | 783 | kinetic_linux-snapdragon: DNE |
556 | diff --git a/active/CVE-2022-42329 b/active/CVE-2022-42329 | |||
557 | index 3a0b3f1..e41cfdf 100644 | |||
558 | --- a/active/CVE-2022-42329 | |||
559 | +++ b/active/CVE-2022-42329 | |||
560 | @@ -11,6 +11,8 @@ References: | |||
561 | 11 | https://ubuntu.com/security/notices/USN-5919-1 | 11 | https://ubuntu.com/security/notices/USN-5919-1 |
562 | 12 | https://ubuntu.com/security/notices/USN-5920-1 | 12 | https://ubuntu.com/security/notices/USN-5920-1 |
563 | 13 | https://ubuntu.com/security/notices/USN-5924-1 | 13 | https://ubuntu.com/security/notices/USN-5924-1 |
564 | 14 | https://ubuntu.com/security/notices/USN-5925-1 | ||
565 | 15 | https://ubuntu.com/security/notices/USN-5927-1 | ||
566 | 14 | Description: | 16 | Description: |
567 | 15 | Guests can trigger deadlock in Linux netback driver T[his CNA information | 17 | Guests can trigger deadlock in Linux netback driver T[his CNA information |
568 | 16 | record relates to multiple CVEs; the text explains which | 18 | record relates to multiple CVEs; the text explains which |
569 | @@ -127,7 +129,7 @@ upstream_linux-kvm: released (6.1) | |||
570 | 127 | esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9) | 129 | esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9) |
571 | 128 | trusty_linux-kvm: DNE | 130 | trusty_linux-kvm: DNE |
572 | 129 | xenial_linux-kvm: ignored (end of standard support) | 131 | xenial_linux-kvm: ignored (end of standard support) |
574 | 130 | bionic_linux-kvm: pending (4.15.0-1136.141) | 132 | bionic_linux-kvm: released (4.15.0-1136.141) |
575 | 131 | focal_linux-kvm: released (5.4.0-1087.93) | 133 | focal_linux-kvm: released (5.4.0-1087.93) |
576 | 132 | jammy_linux-kvm: pending (5.15.0-1029.34) | 134 | jammy_linux-kvm: pending (5.15.0-1029.34) |
577 | 133 | kinetic_linux-kvm: needed | 135 | kinetic_linux-kvm: needed |
578 | @@ -234,7 +236,7 @@ Patches_linux-azure-4.15: | |||
579 | 234 | upstream_linux-azure-4.15: released (6.1) | 236 | upstream_linux-azure-4.15: released (6.1) |
580 | 235 | trusty_linux-azure-4.15: DNE | 237 | trusty_linux-azure-4.15: DNE |
581 | 236 | xenial_linux-azure-4.15: DNE | 238 | xenial_linux-azure-4.15: DNE |
583 | 237 | bionic_linux-azure-4.15: pending (4.15.0-1162.177) | 239 | bionic_linux-azure-4.15: released (4.15.0-1162.177) |
584 | 238 | focal_linux-azure-4.15: DNE | 240 | focal_linux-azure-4.15: DNE |
585 | 239 | jammy_linux-azure-4.15: DNE | 241 | jammy_linux-azure-4.15: DNE |
586 | 240 | kinetic_linux-azure-4.15: DNE | 242 | kinetic_linux-azure-4.15: DNE |
587 | @@ -717,7 +719,7 @@ Patches_linux-raspi2: | |||
588 | 717 | upstream_linux-raspi2: released (6.1) | 719 | upstream_linux-raspi2: released (6.1) |
589 | 718 | trusty_linux-raspi2: DNE | 720 | trusty_linux-raspi2: DNE |
590 | 719 | xenial_linux-raspi2: ignored (end of standard support) | 721 | xenial_linux-raspi2: ignored (end of standard support) |
592 | 720 | bionic_linux-raspi2: pending (4.15.0-1128.136) | 722 | bionic_linux-raspi2: released (4.15.0-1128.136) |
593 | 721 | esm-apps/bionic_linux-raspi2: needs-triage | 723 | esm-apps/bionic_linux-raspi2: needs-triage |
594 | 722 | focal_linux-raspi2: ignored (replaced by linux-raspi) | 724 | focal_linux-raspi2: ignored (replaced by linux-raspi) |
595 | 723 | jammy_linux-raspi2: DNE | 725 | jammy_linux-raspi2: DNE |
596 | @@ -774,7 +776,7 @@ Patches_linux-snapdragon: | |||
597 | 774 | upstream_linux-snapdragon: released (6.1) | 776 | upstream_linux-snapdragon: released (6.1) |
598 | 775 | trusty_linux-snapdragon: DNE | 777 | trusty_linux-snapdragon: DNE |
599 | 776 | xenial_linux-snapdragon: ignored (end of standard support) | 778 | xenial_linux-snapdragon: ignored (end of standard support) |
601 | 777 | bionic_linux-snapdragon: pending (4.15.0-1146.156) | 779 | bionic_linux-snapdragon: released (4.15.0-1146.156) |
602 | 778 | focal_linux-snapdragon: DNE | 780 | focal_linux-snapdragon: DNE |
603 | 779 | jammy_linux-snapdragon: DNE | 781 | jammy_linux-snapdragon: DNE |
604 | 780 | kinetic_linux-snapdragon: DNE | 782 | kinetic_linux-snapdragon: DNE |
605 | diff --git a/active/CVE-2022-42895 b/active/CVE-2022-42895 | |||
606 | index 815ce98..6252f94 100644 | |||
607 | --- a/active/CVE-2022-42895 | |||
608 | +++ b/active/CVE-2022-42895 | |||
609 | @@ -25,6 +25,9 @@ References: | |||
610 | 25 | https://ubuntu.com/security/notices/USN-5919-1 | 25 | https://ubuntu.com/security/notices/USN-5919-1 |
611 | 26 | https://ubuntu.com/security/notices/USN-5920-1 | 26 | https://ubuntu.com/security/notices/USN-5920-1 |
612 | 27 | https://ubuntu.com/security/notices/USN-5924-1 | 27 | https://ubuntu.com/security/notices/USN-5924-1 |
613 | 28 | https://ubuntu.com/security/notices/USN-5925-1 | ||
614 | 29 | https://ubuntu.com/security/notices/USN-5926-1 | ||
615 | 30 | https://ubuntu.com/security/notices/USN-5927-1 | ||
616 | 28 | Description: | 31 | Description: |
617 | 29 | There is an infoleak vulnerability in the Linux kernel's | 32 | There is an infoleak vulnerability in the Linux kernel's |
618 | 30 | net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be | 33 | net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be |
619 | @@ -48,7 +51,7 @@ CVSS: | |||
620 | 48 | Patches_linux: | 51 | Patches_linux: |
621 | 49 | break-fix: 42dceae2819b5ac6fc9a0d414ae05a8960e2a1d9 b1a2cd50c0357f243b7435a732b4e62ba3157a2e | 52 | break-fix: 42dceae2819b5ac6fc9a0d414ae05a8960e2a1d9 b1a2cd50c0357f243b7435a732b4e62ba3157a2e |
622 | 50 | upstream_linux: released (6.1~rc4) | 53 | upstream_linux: released (6.1~rc4) |
624 | 51 | esm-infra/xenial_linux: pending | 54 | esm-infra/xenial_linux: released (4.4.0-237.271) |
625 | 52 | trusty_linux: ignored (out of standard support) | 55 | trusty_linux: ignored (out of standard support) |
626 | 53 | xenial_linux: ignored (out of standard support) | 56 | xenial_linux: ignored (out of standard support) |
627 | 54 | bionic_linux: released (4.15.0-206.217) | 57 | bionic_linux: released (4.15.0-206.217) |
628 | @@ -131,14 +134,14 @@ bionic_linux-lts-xenial: DNE | |||
629 | 131 | focal_linux-lts-xenial: DNE | 134 | focal_linux-lts-xenial: DNE |
630 | 132 | jammy_linux-lts-xenial: DNE | 135 | jammy_linux-lts-xenial: DNE |
631 | 133 | kinetic_linux-lts-xenial: DNE | 136 | kinetic_linux-lts-xenial: DNE |
633 | 134 | trusty/esm_linux-lts-xenial: pending | 137 | trusty/esm_linux-lts-xenial: released (4.4.0-237.271~14.04.1) |
634 | 135 | 138 | ||
635 | 136 | Patches_linux-kvm: | 139 | Patches_linux-kvm: |
636 | 137 | upstream_linux-kvm: released (6.1~rc4) | 140 | upstream_linux-kvm: released (6.1~rc4) |
638 | 138 | esm-infra/xenial_linux-kvm: pending | 141 | esm-infra/xenial_linux-kvm: released (4.4.0-1117.127) |
639 | 139 | trusty_linux-kvm: DNE | 142 | trusty_linux-kvm: DNE |
640 | 140 | xenial_linux-kvm: ignored (end of standard support) | 143 | xenial_linux-kvm: ignored (end of standard support) |
642 | 141 | bionic_linux-kvm: pending (4.15.0-1136.141) | 144 | bionic_linux-kvm: released (4.15.0-1136.141) |
643 | 142 | focal_linux-kvm: released (5.4.0-1086.92) | 145 | focal_linux-kvm: released (5.4.0-1086.92) |
644 | 143 | jammy_linux-kvm: released (5.15.0-1028.33) | 146 | jammy_linux-kvm: released (5.15.0-1028.33) |
645 | 144 | kinetic_linux-kvm: released (5.19.0-1018.19) | 147 | kinetic_linux-kvm: released (5.19.0-1018.19) |
646 | @@ -153,7 +156,7 @@ bionic_linux-aws: released (4.15.0-1151.164) | |||
647 | 153 | focal_linux-aws: released (5.4.0-1096.104) | 156 | focal_linux-aws: released (5.4.0-1096.104) |
648 | 154 | jammy_linux-aws: released (5.15.0-1030.34) | 157 | jammy_linux-aws: released (5.15.0-1030.34) |
649 | 155 | kinetic_linux-aws: released (5.19.0-1019.20) | 158 | kinetic_linux-aws: released (5.19.0-1019.20) |
651 | 156 | trusty/esm_linux-aws: pending | 159 | trusty/esm_linux-aws: released (4.4.0-1116.122) |
652 | 157 | devel_linux-aws: pending | 160 | devel_linux-aws: pending |
653 | 158 | 161 | ||
654 | 159 | Patches_linux-aws-5.0: | 162 | Patches_linux-aws-5.0: |
655 | @@ -245,7 +248,7 @@ Patches_linux-azure-4.15: | |||
656 | 245 | upstream_linux-azure-4.15: released (6.1~rc4) | 248 | upstream_linux-azure-4.15: released (6.1~rc4) |
657 | 246 | trusty_linux-azure-4.15: DNE | 249 | trusty_linux-azure-4.15: DNE |
658 | 247 | xenial_linux-azure-4.15: DNE | 250 | xenial_linux-azure-4.15: DNE |
660 | 248 | bionic_linux-azure-4.15: pending (4.15.0-1162.177) | 251 | bionic_linux-azure-4.15: released (4.15.0-1162.177) |
661 | 249 | focal_linux-azure-4.15: DNE | 252 | focal_linux-azure-4.15: DNE |
662 | 250 | jammy_linux-azure-4.15: DNE | 253 | jammy_linux-azure-4.15: DNE |
663 | 251 | kinetic_linux-azure-4.15: DNE | 254 | kinetic_linux-azure-4.15: DNE |
664 | @@ -728,7 +731,7 @@ Patches_linux-raspi2: | |||
665 | 728 | upstream_linux-raspi2: released (6.1~rc4) | 731 | upstream_linux-raspi2: released (6.1~rc4) |
666 | 729 | trusty_linux-raspi2: DNE | 732 | trusty_linux-raspi2: DNE |
667 | 730 | xenial_linux-raspi2: ignored (end of standard support) | 733 | xenial_linux-raspi2: ignored (end of standard support) |
669 | 731 | bionic_linux-raspi2: pending (4.15.0-1128.136) | 734 | bionic_linux-raspi2: released (4.15.0-1128.136) |
670 | 732 | esm-apps/bionic_linux-raspi2: needs-triage | 735 | esm-apps/bionic_linux-raspi2: needs-triage |
671 | 733 | focal_linux-raspi2: ignored (replaced by linux-raspi) | 736 | focal_linux-raspi2: ignored (replaced by linux-raspi) |
672 | 734 | jammy_linux-raspi2: DNE | 737 | jammy_linux-raspi2: DNE |
673 | @@ -785,7 +788,7 @@ Patches_linux-snapdragon: | |||
674 | 785 | upstream_linux-snapdragon: released (6.1~rc4) | 788 | upstream_linux-snapdragon: released (6.1~rc4) |
675 | 786 | trusty_linux-snapdragon: DNE | 789 | trusty_linux-snapdragon: DNE |
676 | 787 | xenial_linux-snapdragon: ignored (end of standard support) | 790 | xenial_linux-snapdragon: ignored (end of standard support) |
678 | 788 | bionic_linux-snapdragon: pending (4.15.0-1146.156) | 791 | bionic_linux-snapdragon: released (4.15.0-1146.156) |
679 | 789 | focal_linux-snapdragon: DNE | 792 | focal_linux-snapdragon: DNE |
680 | 790 | jammy_linux-snapdragon: DNE | 793 | jammy_linux-snapdragon: DNE |
681 | 791 | kinetic_linux-snapdragon: DNE | 794 | kinetic_linux-snapdragon: DNE |
682 | diff --git a/active/CVE-2022-47929 b/active/CVE-2022-47929 | |||
683 | index b11e120..8f957e9 100644 | |||
684 | --- a/active/CVE-2022-47929 | |||
685 | +++ b/active/CVE-2022-47929 | |||
686 | @@ -10,6 +10,7 @@ References: | |||
687 | 10 | https://ubuntu.com/security/notices/USN-5915-1 | 10 | https://ubuntu.com/security/notices/USN-5915-1 |
688 | 11 | https://ubuntu.com/security/notices/USN-5917-1 | 11 | https://ubuntu.com/security/notices/USN-5917-1 |
689 | 12 | https://ubuntu.com/security/notices/USN-5924-1 | 12 | https://ubuntu.com/security/notices/USN-5924-1 |
690 | 13 | https://ubuntu.com/security/notices/USN-5927-1 | ||
691 | 13 | Description: | 14 | Description: |
692 | 14 | In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the | 15 | In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the |
693 | 15 | traffic control subsystem allows an unprivileged user to trigger a denial | 16 | traffic control subsystem allows an unprivileged user to trigger a denial |
694 | @@ -229,7 +230,7 @@ Patches_linux-azure-4.15: | |||
695 | 229 | upstream_linux-azure-4.15: released (6.2~rc4) | 230 | upstream_linux-azure-4.15: released (6.2~rc4) |
696 | 230 | trusty_linux-azure-4.15: DNE | 231 | trusty_linux-azure-4.15: DNE |
697 | 231 | xenial_linux-azure-4.15: DNE | 232 | xenial_linux-azure-4.15: DNE |
699 | 232 | bionic_linux-azure-4.15: pending (4.15.0-1162.177) | 233 | bionic_linux-azure-4.15: released (4.15.0-1162.177) |
700 | 233 | focal_linux-azure-4.15: DNE | 234 | focal_linux-azure-4.15: DNE |
701 | 234 | jammy_linux-azure-4.15: DNE | 235 | jammy_linux-azure-4.15: DNE |
702 | 235 | kinetic_linux-azure-4.15: DNE | 236 | kinetic_linux-azure-4.15: DNE |
703 | diff --git a/active/CVE-2023-0045 b/active/CVE-2023-0045 | |||
704 | index 024671c..10e141f 100644 | |||
705 | --- a/active/CVE-2023-0045 | |||
706 | +++ b/active/CVE-2023-0045 | |||
707 | @@ -13,6 +13,8 @@ References: | |||
708 | 13 | https://ubuntu.com/security/notices/USN-5915-1 | 13 | https://ubuntu.com/security/notices/USN-5915-1 |
709 | 14 | https://ubuntu.com/security/notices/USN-5917-1 | 14 | https://ubuntu.com/security/notices/USN-5917-1 |
710 | 15 | https://ubuntu.com/security/notices/USN-5924-1 | 15 | https://ubuntu.com/security/notices/USN-5924-1 |
711 | 16 | https://ubuntu.com/security/notices/USN-5926-1 | ||
712 | 17 | https://ubuntu.com/security/notices/USN-5927-1 | ||
713 | 16 | Description: | 18 | Description: |
714 | 17 | Ubuntu-Description: | 19 | Ubuntu-Description: |
715 | 18 | José Oliveira and Rodrigo Branco discovered that the prctl syscall | 20 | José Oliveira and Rodrigo Branco discovered that the prctl syscall |
716 | @@ -30,7 +32,7 @@ CVSS: | |||
717 | 30 | Patches_linux: | 32 | Patches_linux: |
718 | 31 | break-fix: 9137bb27e60e554dab694eafa4cca241fa3a694f a664ec9158eeddd75121d39c9a0758016097fa96 | 33 | break-fix: 9137bb27e60e554dab694eafa4cca241fa3a694f a664ec9158eeddd75121d39c9a0758016097fa96 |
719 | 32 | upstream_linux: released (6.2~rc3) | 34 | upstream_linux: released (6.2~rc3) |
721 | 33 | esm-infra/xenial_linux: ignored (was needed ESM criteria) | 35 | esm-infra/xenial_linux: released (4.4.0-237.271) |
722 | 34 | trusty_linux: ignored (out of standard support) | 36 | trusty_linux: ignored (out of standard support) |
723 | 35 | xenial_linux: ignored (out of standard support) | 37 | xenial_linux: ignored (out of standard support) |
724 | 36 | bionic_linux: needed | 38 | bionic_linux: needed |
725 | @@ -113,11 +115,11 @@ bionic_linux-lts-xenial: DNE | |||
726 | 113 | focal_linux-lts-xenial: DNE | 115 | focal_linux-lts-xenial: DNE |
727 | 114 | jammy_linux-lts-xenial: DNE | 116 | jammy_linux-lts-xenial: DNE |
728 | 115 | kinetic_linux-lts-xenial: DNE | 117 | kinetic_linux-lts-xenial: DNE |
730 | 116 | trusty/esm_linux-lts-xenial: ignored (was needed ESM criteria) | 118 | trusty/esm_linux-lts-xenial: released (4.4.0-237.271~14.04.1) |
731 | 117 | 119 | ||
732 | 118 | Patches_linux-kvm: | 120 | Patches_linux-kvm: |
733 | 119 | upstream_linux-kvm: released (6.2~rc3) | 121 | upstream_linux-kvm: released (6.2~rc3) |
735 | 120 | esm-infra/xenial_linux-kvm: ignored (was needed ESM criteria) | 122 | esm-infra/xenial_linux-kvm: released (4.4.0-1117.127) |
736 | 121 | trusty_linux-kvm: DNE | 123 | trusty_linux-kvm: DNE |
737 | 122 | xenial_linux-kvm: ignored (end of standard support) | 124 | xenial_linux-kvm: ignored (end of standard support) |
738 | 123 | bionic_linux-kvm: needed | 125 | bionic_linux-kvm: needed |
739 | @@ -135,7 +137,7 @@ bionic_linux-aws: needed | |||
740 | 135 | focal_linux-aws: released (5.4.0-1097.105) | 137 | focal_linux-aws: released (5.4.0-1097.105) |
741 | 136 | jammy_linux-aws: needed | 138 | jammy_linux-aws: needed |
742 | 137 | kinetic_linux-aws: needed | 139 | kinetic_linux-aws: needed |
744 | 138 | trusty/esm_linux-aws: ignored (was needed ESM criteria) | 140 | trusty/esm_linux-aws: released (4.4.0-1116.122) |
745 | 139 | devel_linux-aws: needed | 141 | devel_linux-aws: needed |
746 | 140 | 142 | ||
747 | 141 | Patches_linux-aws-5.0: | 143 | Patches_linux-aws-5.0: |
748 | @@ -227,7 +229,7 @@ Patches_linux-azure-4.15: | |||
749 | 227 | upstream_linux-azure-4.15: released (6.2~rc3) | 229 | upstream_linux-azure-4.15: released (6.2~rc3) |
750 | 228 | trusty_linux-azure-4.15: DNE | 230 | trusty_linux-azure-4.15: DNE |
751 | 229 | xenial_linux-azure-4.15: DNE | 231 | xenial_linux-azure-4.15: DNE |
753 | 230 | bionic_linux-azure-4.15: needed | 232 | bionic_linux-azure-4.15: released (4.15.0-1162.177) |
754 | 231 | focal_linux-azure-4.15: DNE | 233 | focal_linux-azure-4.15: DNE |
755 | 232 | jammy_linux-azure-4.15: DNE | 234 | jammy_linux-azure-4.15: DNE |
756 | 233 | kinetic_linux-azure-4.15: DNE | 235 | kinetic_linux-azure-4.15: DNE |
757 | diff --git a/active/CVE-2023-0266 b/active/CVE-2023-0266 | |||
758 | index fee45a2..78ca91f 100644 | |||
759 | --- a/active/CVE-2023-0266 | |||
760 | +++ b/active/CVE-2023-0266 | |||
761 | @@ -7,6 +7,7 @@ References: | |||
762 | 7 | https://ubuntu.com/security/notices/USN-5915-1 | 7 | https://ubuntu.com/security/notices/USN-5915-1 |
763 | 8 | https://ubuntu.com/security/notices/USN-5917-1 | 8 | https://ubuntu.com/security/notices/USN-5917-1 |
764 | 9 | https://ubuntu.com/security/notices/USN-5924-1 | 9 | https://ubuntu.com/security/notices/USN-5924-1 |
765 | 10 | https://ubuntu.com/security/notices/USN-5927-1 | ||
766 | 10 | Description: | 11 | Description: |
767 | 11 | A use after free vulnerability exists in the ALSA PCM package in the Linux | 12 | A use after free vulnerability exists in the ALSA PCM package in the Linux |
768 | 12 | Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be | 13 | Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be |
769 | @@ -229,7 +230,7 @@ Patches_linux-azure-4.15: | |||
770 | 229 | upstream_linux-azure-4.15: released (6.2~rc4) | 230 | upstream_linux-azure-4.15: released (6.2~rc4) |
771 | 230 | trusty_linux-azure-4.15: DNE | 231 | trusty_linux-azure-4.15: DNE |
772 | 231 | xenial_linux-azure-4.15: DNE | 232 | xenial_linux-azure-4.15: DNE |
774 | 232 | bionic_linux-azure-4.15: needed | 233 | bionic_linux-azure-4.15: released (4.15.0-1162.177) |
775 | 233 | focal_linux-azure-4.15: DNE | 234 | focal_linux-azure-4.15: DNE |
776 | 234 | jammy_linux-azure-4.15: DNE | 235 | jammy_linux-azure-4.15: DNE |
777 | 235 | kinetic_linux-azure-4.15: DNE | 236 | kinetic_linux-azure-4.15: DNE |
778 | diff --git a/active/CVE-2023-0394 b/active/CVE-2023-0394 | |||
779 | index 90e6e73..589081b 100644 | |||
780 | --- a/active/CVE-2023-0394 | |||
781 | +++ b/active/CVE-2023-0394 | |||
782 | @@ -7,6 +7,7 @@ References: | |||
783 | 7 | https://git.kernel.org/linus/cb3e9864cdbe35ff6378966660edbcbac955fe17 (6.2-rc4) | 7 | https://git.kernel.org/linus/cb3e9864cdbe35ff6378966660edbcbac955fe17 (6.2-rc4) |
784 | 8 | https://ubuntu.com/security/notices/USN-5917-1 | 8 | https://ubuntu.com/security/notices/USN-5917-1 |
785 | 9 | https://ubuntu.com/security/notices/USN-5924-1 | 9 | https://ubuntu.com/security/notices/USN-5924-1 |
786 | 10 | https://ubuntu.com/security/notices/USN-5927-1 | ||
787 | 10 | Description: | 11 | Description: |
788 | 11 | A NULL pointer dereference flaw was found in rawv6_push_pending_frames in | 12 | A NULL pointer dereference flaw was found in rawv6_push_pending_frames in |
789 | 12 | net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw | 13 | net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw |
790 | @@ -224,7 +225,7 @@ Patches_linux-azure-4.15: | |||
791 | 224 | upstream_linux-azure-4.15: needs-triage | 225 | upstream_linux-azure-4.15: needs-triage |
792 | 225 | trusty_linux-azure-4.15: DNE | 226 | trusty_linux-azure-4.15: DNE |
793 | 226 | xenial_linux-azure-4.15: DNE | 227 | xenial_linux-azure-4.15: DNE |
795 | 227 | bionic_linux-azure-4.15: needs-triage | 228 | bionic_linux-azure-4.15: released (4.15.0-1162.177) |
796 | 228 | focal_linux-azure-4.15: DNE | 229 | focal_linux-azure-4.15: DNE |
797 | 229 | jammy_linux-azure-4.15: DNE | 230 | jammy_linux-azure-4.15: DNE |
798 | 230 | kinetic_linux-azure-4.15: DNE | 231 | kinetic_linux-azure-4.15: DNE |
799 | diff --git a/active/CVE-2023-0461 b/active/CVE-2023-0461 | |||
800 | index 5734750..74fa5b6 100644 | |||
801 | --- a/active/CVE-2023-0461 | |||
802 | +++ b/active/CVE-2023-0461 | |||
803 | @@ -13,6 +13,8 @@ References: | |||
804 | 13 | https://ubuntu.com/security/notices/USN-5919-1 | 13 | https://ubuntu.com/security/notices/USN-5919-1 |
805 | 14 | https://ubuntu.com/security/notices/USN-5920-1 | 14 | https://ubuntu.com/security/notices/USN-5920-1 |
806 | 15 | https://ubuntu.com/security/notices/USN-5924-1 | 15 | https://ubuntu.com/security/notices/USN-5924-1 |
807 | 16 | https://ubuntu.com/security/notices/USN-5925-1 | ||
808 | 17 | https://ubuntu.com/security/notices/USN-5927-1 | ||
809 | 16 | Description: | 18 | Description: |
810 | 17 | There is a use-after-free vulnerability in the Linux Kernel which can be | 19 | There is a use-after-free vulnerability in the Linux Kernel which can be |
811 | 18 | exploited to achieve local privilege escalation. To reach the vulnerability | 20 | exploited to achieve local privilege escalation. To reach the vulnerability |
812 | @@ -142,7 +144,7 @@ upstream_linux-kvm: released (6.2~rc3) | |||
813 | 142 | esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9) | 144 | esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9) |
814 | 143 | trusty_linux-kvm: DNE | 145 | trusty_linux-kvm: DNE |
815 | 144 | xenial_linux-kvm: ignored (end of standard support) | 146 | xenial_linux-kvm: ignored (end of standard support) |
817 | 145 | bionic_linux-kvm: pending (4.15.0-1136.141) | 147 | bionic_linux-kvm: released (4.15.0-1136.141) |
818 | 146 | focal_linux-kvm: released (5.4.0-1087.93) | 148 | focal_linux-kvm: released (5.4.0-1087.93) |
819 | 147 | jammy_linux-kvm: pending (5.15.0-1029.34) | 149 | jammy_linux-kvm: pending (5.15.0-1029.34) |
820 | 148 | kinetic_linux-kvm: pending (5.19.0-1019.20) | 150 | kinetic_linux-kvm: pending (5.19.0-1019.20) |
821 | @@ -249,7 +251,7 @@ Patches_linux-azure-4.15: | |||
822 | 249 | upstream_linux-azure-4.15: released (6.2~rc3) | 251 | upstream_linux-azure-4.15: released (6.2~rc3) |
823 | 250 | trusty_linux-azure-4.15: DNE | 252 | trusty_linux-azure-4.15: DNE |
824 | 251 | xenial_linux-azure-4.15: DNE | 253 | xenial_linux-azure-4.15: DNE |
826 | 252 | bionic_linux-azure-4.15: needed | 254 | bionic_linux-azure-4.15: released (4.15.0-1162.177) |
827 | 253 | focal_linux-azure-4.15: DNE | 255 | focal_linux-azure-4.15: DNE |
828 | 254 | jammy_linux-azure-4.15: DNE | 256 | jammy_linux-azure-4.15: DNE |
829 | 255 | kinetic_linux-azure-4.15: DNE | 257 | kinetic_linux-azure-4.15: DNE |
830 | @@ -767,7 +769,7 @@ Patches_linux-raspi2: | |||
831 | 767 | upstream_linux-raspi2: released (6.2~rc3) | 769 | upstream_linux-raspi2: released (6.2~rc3) |
832 | 768 | trusty_linux-raspi2: DNE | 770 | trusty_linux-raspi2: DNE |
833 | 769 | xenial_linux-raspi2: ignored (end of standard support) | 771 | xenial_linux-raspi2: ignored (end of standard support) |
835 | 770 | bionic_linux-raspi2: pending (4.15.0-1128.136) | 772 | bionic_linux-raspi2: released (4.15.0-1128.136) |
836 | 771 | focal_linux-raspi2: ignored (replaced by linux-raspi) | 773 | focal_linux-raspi2: ignored (replaced by linux-raspi) |
837 | 772 | jammy_linux-raspi2: DNE | 774 | jammy_linux-raspi2: DNE |
838 | 773 | kinetic_linux-raspi2: DNE | 775 | kinetic_linux-raspi2: DNE |
839 | @@ -824,7 +826,7 @@ Patches_linux-snapdragon: | |||
840 | 824 | upstream_linux-snapdragon: released (6.2~rc3) | 826 | upstream_linux-snapdragon: released (6.2~rc3) |
841 | 825 | trusty_linux-snapdragon: DNE | 827 | trusty_linux-snapdragon: DNE |
842 | 826 | xenial_linux-snapdragon: ignored (end of standard support) | 828 | xenial_linux-snapdragon: ignored (end of standard support) |
844 | 827 | bionic_linux-snapdragon: pending (4.15.0-1146.156) | 829 | bionic_linux-snapdragon: released (4.15.0-1146.156) |
845 | 828 | focal_linux-snapdragon: DNE | 830 | focal_linux-snapdragon: DNE |
846 | 829 | jammy_linux-snapdragon: DNE | 831 | jammy_linux-snapdragon: DNE |
847 | 830 | kinetic_linux-snapdragon: DNE | 832 | kinetic_linux-snapdragon: DNE |
848 | diff --git a/active/CVE-2023-0795 b/active/CVE-2023-0795 | |||
849 | index 7dec1e4..483058d 100644 | |||
850 | --- a/active/CVE-2023-0795 | |||
851 | +++ b/active/CVE-2023-0795 | |||
852 | @@ -1,3 +1,4 @@ | |||
853 | 1 | PublicDateAtUSN: 2023-02-13 23:15:00 UTC | ||
854 | 1 | Candidate: CVE-2023-0795 | 2 | Candidate: CVE-2023-0795 |
855 | 2 | PublicDate: 2023-02-13 23:15:00 UTC | 3 | PublicDate: 2023-02-13 23:15:00 UTC |
856 | 3 | References: | 4 | References: |
857 | @@ -5,6 +6,7 @@ References: | |||
858 | 5 | https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68 | 6 | https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68 |
859 | 6 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0795.json | 7 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0795.json |
860 | 7 | https://gitlab.com/libtiff/libtiff/-/issues/493 | 8 | https://gitlab.com/libtiff/libtiff/-/issues/493 |
861 | 9 | https://ubuntu.com/security/notices/USN-5923-1 | ||
862 | 8 | Description: | 10 | Description: |
863 | 9 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in | 11 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in |
864 | 10 | tools/tiffcrop.c:3488, allowing attackers to cause a denial-of-service via | 12 | tools/tiffcrop.c:3488, allowing attackers to cause a denial-of-service via |
865 | @@ -22,12 +24,12 @@ CVSS: | |||
866 | 22 | 24 | ||
867 | 23 | Patches_tiff: | 25 | Patches_tiff: |
868 | 24 | upstream_tiff: needs-triage | 26 | upstream_tiff: needs-triage |
870 | 25 | esm-infra/xenial_tiff: needed | 27 | esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10) |
871 | 26 | trusty_tiff: ignored (out of standard support) | 28 | trusty_tiff: ignored (out of standard support) |
872 | 27 | xenial_tiff: ignored (out of standard support) | 29 | xenial_tiff: ignored (out of standard support) |
878 | 28 | bionic_tiff: needed | 30 | bionic_tiff: released (4.0.9-5ubuntu0.10) |
879 | 29 | focal_tiff: needed | 31 | focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8) |
880 | 30 | jammy_tiff: needed | 32 | jammy_tiff: released (4.3.0-6ubuntu0.4) |
881 | 31 | kinetic_tiff: needed | 33 | kinetic_tiff: released (4.4.0-4ubuntu3.3) |
882 | 32 | trusty/esm_tiff: needed | 34 | trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7) |
883 | 33 | devel_tiff: needed | 35 | devel_tiff: needed |
884 | diff --git a/active/CVE-2023-0796 b/active/CVE-2023-0796 | |||
885 | index ac71312..a30205c 100644 | |||
886 | --- a/active/CVE-2023-0796 | |||
887 | +++ b/active/CVE-2023-0796 | |||
888 | @@ -1,3 +1,4 @@ | |||
889 | 1 | PublicDateAtUSN: 2023-02-13 23:15:00 UTC | ||
890 | 1 | Candidate: CVE-2023-0796 | 2 | Candidate: CVE-2023-0796 |
891 | 2 | PublicDate: 2023-02-13 23:15:00 UTC | 3 | PublicDate: 2023-02-13 23:15:00 UTC |
892 | 3 | References: | 4 | References: |
893 | @@ -5,6 +6,7 @@ References: | |||
894 | 5 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0796.json | 6 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0796.json |
895 | 6 | https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68 | 7 | https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68 |
896 | 7 | https://gitlab.com/libtiff/libtiff/-/issues/499 | 8 | https://gitlab.com/libtiff/libtiff/-/issues/499 |
897 | 9 | https://ubuntu.com/security/notices/USN-5923-1 | ||
898 | 8 | Description: | 10 | Description: |
899 | 9 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in | 11 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in |
900 | 10 | tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via | 12 | tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via |
901 | @@ -22,12 +24,12 @@ CVSS: | |||
902 | 22 | 24 | ||
903 | 23 | Patches_tiff: | 25 | Patches_tiff: |
904 | 24 | upstream_tiff: needs-triage | 26 | upstream_tiff: needs-triage |
906 | 25 | esm-infra/xenial_tiff: needed | 27 | esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10) |
907 | 26 | trusty_tiff: ignored (out of standard support) | 28 | trusty_tiff: ignored (out of standard support) |
908 | 27 | xenial_tiff: ignored (out of standard support) | 29 | xenial_tiff: ignored (out of standard support) |
914 | 28 | bionic_tiff: needed | 30 | bionic_tiff: released (4.0.9-5ubuntu0.10) |
915 | 29 | focal_tiff: needed | 31 | focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8) |
916 | 30 | jammy_tiff: needed | 32 | jammy_tiff: released (4.3.0-6ubuntu0.4) |
917 | 31 | kinetic_tiff: needed | 33 | kinetic_tiff: released (4.4.0-4ubuntu3.3) |
918 | 32 | trusty/esm_tiff: needed | 34 | trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7) |
919 | 33 | devel_tiff: needed | 35 | devel_tiff: needed |
920 | diff --git a/active/CVE-2023-0797 b/active/CVE-2023-0797 | |||
921 | index 578240d..704dce7 100644 | |||
922 | --- a/active/CVE-2023-0797 | |||
923 | +++ b/active/CVE-2023-0797 | |||
924 | @@ -1,3 +1,4 @@ | |||
925 | 1 | PublicDateAtUSN: 2023-02-13 23:15:00 UTC | ||
926 | 1 | Candidate: CVE-2023-0797 | 2 | Candidate: CVE-2023-0797 |
927 | 2 | PublicDate: 2023-02-13 23:15:00 UTC | 3 | PublicDate: 2023-02-13 23:15:00 UTC |
928 | 3 | References: | 4 | References: |
929 | @@ -5,6 +6,7 @@ References: | |||
930 | 5 | https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68 | 6 | https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68 |
931 | 6 | https://gitlab.com/libtiff/libtiff/-/issues/495 | 7 | https://gitlab.com/libtiff/libtiff/-/issues/495 |
932 | 7 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0797.json | 8 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0797.json |
933 | 9 | https://ubuntu.com/security/notices/USN-5923-1 | ||
934 | 8 | Description: | 10 | Description: |
935 | 9 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in | 11 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in |
936 | 10 | libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and | 12 | libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and |
937 | @@ -23,12 +25,12 @@ CVSS: | |||
938 | 23 | 25 | ||
939 | 24 | Patches_tiff: | 26 | Patches_tiff: |
940 | 25 | upstream_tiff: needs-triage | 27 | upstream_tiff: needs-triage |
942 | 26 | esm-infra/xenial_tiff: needed | 28 | esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10) |
943 | 27 | trusty_tiff: ignored (out of standard support) | 29 | trusty_tiff: ignored (out of standard support) |
944 | 28 | xenial_tiff: ignored (out of standard support) | 30 | xenial_tiff: ignored (out of standard support) |
950 | 29 | bionic_tiff: needed | 31 | bionic_tiff: released (4.0.9-5ubuntu0.10) |
951 | 30 | focal_tiff: needed | 32 | focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8) |
952 | 31 | jammy_tiff: needed | 33 | jammy_tiff: released (4.3.0-6ubuntu0.4) |
953 | 32 | kinetic_tiff: needed | 34 | kinetic_tiff: released (4.4.0-4ubuntu3.3) |
954 | 33 | trusty/esm_tiff: needed | 35 | trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7) |
955 | 34 | devel_tiff: needed | 36 | devel_tiff: needed |
956 | diff --git a/active/CVE-2023-0798 b/active/CVE-2023-0798 | |||
957 | index 371f0f1..2921a4c 100644 | |||
958 | --- a/active/CVE-2023-0798 | |||
959 | +++ b/active/CVE-2023-0798 | |||
960 | @@ -1,3 +1,4 @@ | |||
961 | 1 | PublicDateAtUSN: 2023-02-13 23:15:00 UTC | ||
962 | 1 | Candidate: CVE-2023-0798 | 2 | Candidate: CVE-2023-0798 |
963 | 2 | PublicDate: 2023-02-13 23:15:00 UTC | 3 | PublicDate: 2023-02-13 23:15:00 UTC |
964 | 3 | References: | 4 | References: |
965 | @@ -5,6 +6,7 @@ References: | |||
966 | 5 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0798.json | 6 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0798.json |
967 | 6 | https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68 | 7 | https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68 |
968 | 7 | https://gitlab.com/libtiff/libtiff/-/issues/492 | 8 | https://gitlab.com/libtiff/libtiff/-/issues/492 |
969 | 9 | https://ubuntu.com/security/notices/USN-5923-1 | ||
970 | 8 | Description: | 10 | Description: |
971 | 9 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in | 11 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in |
972 | 10 | tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via | 12 | tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via |
973 | @@ -22,12 +24,12 @@ CVSS: | |||
974 | 22 | 24 | ||
975 | 23 | Patches_tiff: | 25 | Patches_tiff: |
976 | 24 | upstream_tiff: needs-triage | 26 | upstream_tiff: needs-triage |
978 | 25 | esm-infra/xenial_tiff: needed | 27 | esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10) |
979 | 26 | trusty_tiff: ignored (out of standard support) | 28 | trusty_tiff: ignored (out of standard support) |
980 | 27 | xenial_tiff: ignored (out of standard support) | 29 | xenial_tiff: ignored (out of standard support) |
986 | 28 | bionic_tiff: needed | 30 | bionic_tiff: released (4.0.9-5ubuntu0.10) |
987 | 29 | focal_tiff: needed | 31 | focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8) |
988 | 30 | jammy_tiff: needed | 32 | jammy_tiff: released (4.3.0-6ubuntu0.4) |
989 | 31 | kinetic_tiff: needed | 33 | kinetic_tiff: released (4.4.0-4ubuntu3.3) |
990 | 32 | trusty/esm_tiff: needed | 34 | trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7) |
991 | 33 | devel_tiff: needed | 35 | devel_tiff: needed |
992 | diff --git a/active/CVE-2023-0799 b/active/CVE-2023-0799 | |||
993 | index 67d434b..aa4f1b2 100644 | |||
994 | --- a/active/CVE-2023-0799 | |||
995 | +++ b/active/CVE-2023-0799 | |||
996 | @@ -1,3 +1,4 @@ | |||
997 | 1 | PublicDateAtUSN: 2023-02-13 23:15:00 UTC | ||
998 | 1 | Candidate: CVE-2023-0799 | 2 | Candidate: CVE-2023-0799 |
999 | 2 | PublicDate: 2023-02-13 23:15:00 UTC | 3 | PublicDate: 2023-02-13 23:15:00 UTC |
1000 | 3 | References: | 4 | References: |
1001 | @@ -5,6 +6,7 @@ References: | |||
1002 | 5 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0799.json | 6 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0799.json |
1003 | 6 | https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68 | 7 | https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68 |
1004 | 7 | https://gitlab.com/libtiff/libtiff/-/issues/494 | 8 | https://gitlab.com/libtiff/libtiff/-/issues/494 |
1005 | 9 | https://ubuntu.com/security/notices/USN-5923-1 | ||
1006 | 8 | Description: | 10 | Description: |
1007 | 9 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in | 11 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in |
1008 | 10 | tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via | 12 | tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via |
1009 | @@ -22,12 +24,12 @@ CVSS: | |||
1010 | 22 | 24 | ||
1011 | 23 | Patches_tiff: | 25 | Patches_tiff: |
1012 | 24 | upstream_tiff: needs-triage | 26 | upstream_tiff: needs-triage |
1014 | 25 | esm-infra/xenial_tiff: needed | 27 | esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10) |
1015 | 26 | trusty_tiff: ignored (out of standard support) | 28 | trusty_tiff: ignored (out of standard support) |
1016 | 27 | xenial_tiff: ignored (out of standard support) | 29 | xenial_tiff: ignored (out of standard support) |
1022 | 28 | bionic_tiff: needed | 30 | bionic_tiff: released (4.0.9-5ubuntu0.10) |
1023 | 29 | focal_tiff: needed | 31 | focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8) |
1024 | 30 | jammy_tiff: needed | 32 | jammy_tiff: released (4.3.0-6ubuntu0.4) |
1025 | 31 | kinetic_tiff: needed | 33 | kinetic_tiff: released (4.4.0-4ubuntu3.3) |
1026 | 32 | trusty/esm_tiff: needed | 34 | trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7) |
1027 | 33 | devel_tiff: needed | 35 | devel_tiff: needed |
1028 | diff --git a/active/CVE-2023-0800 b/active/CVE-2023-0800 | |||
1029 | index f75dbe3..157e62e 100644 | |||
1030 | --- a/active/CVE-2023-0800 | |||
1031 | +++ b/active/CVE-2023-0800 | |||
1032 | @@ -1,3 +1,4 @@ | |||
1033 | 1 | PublicDateAtUSN: 2023-02-13 23:15:00 UTC | ||
1034 | 1 | Candidate: CVE-2023-0800 | 2 | Candidate: CVE-2023-0800 |
1035 | 2 | PublicDate: 2023-02-13 23:15:00 UTC | 3 | PublicDate: 2023-02-13 23:15:00 UTC |
1036 | 3 | References: | 4 | References: |
1037 | @@ -5,6 +6,7 @@ References: | |||
1038 | 5 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0800.json | 6 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0800.json |
1039 | 6 | https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00 | 7 | https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00 |
1040 | 7 | https://gitlab.com/libtiff/libtiff/-/issues/496 | 8 | https://gitlab.com/libtiff/libtiff/-/issues/496 |
1041 | 9 | https://ubuntu.com/security/notices/USN-5923-1 | ||
1042 | 8 | Description: | 10 | Description: |
1043 | 9 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in | 11 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in |
1044 | 10 | tools/tiffcrop.c:3502, allowing attackers to cause a denial-of-service via | 12 | tools/tiffcrop.c:3502, allowing attackers to cause a denial-of-service via |
1045 | @@ -22,12 +24,12 @@ CVSS: | |||
1046 | 22 | 24 | ||
1047 | 23 | Patches_tiff: | 25 | Patches_tiff: |
1048 | 24 | upstream_tiff: needs-triage | 26 | upstream_tiff: needs-triage |
1050 | 25 | esm-infra/xenial_tiff: needed | 27 | esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10) |
1051 | 26 | trusty_tiff: ignored (out of standard support) | 28 | trusty_tiff: ignored (out of standard support) |
1052 | 27 | xenial_tiff: ignored (out of standard support) | 29 | xenial_tiff: ignored (out of standard support) |
1058 | 28 | bionic_tiff: needed | 30 | bionic_tiff: released (4.0.9-5ubuntu0.10) |
1059 | 29 | focal_tiff: needed | 31 | focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8) |
1060 | 30 | jammy_tiff: needed | 32 | jammy_tiff: released (4.3.0-6ubuntu0.4) |
1061 | 31 | kinetic_tiff: needed | 33 | kinetic_tiff: released (4.4.0-4ubuntu3.3) |
1062 | 32 | trusty/esm_tiff: needed | 34 | trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7) |
1063 | 33 | devel_tiff: needed | 35 | devel_tiff: needed |
1064 | diff --git a/active/CVE-2023-0801 b/active/CVE-2023-0801 | |||
1065 | index 27f6a21..afea0fe 100644 | |||
1066 | --- a/active/CVE-2023-0801 | |||
1067 | +++ b/active/CVE-2023-0801 | |||
1068 | @@ -1,3 +1,4 @@ | |||
1069 | 1 | PublicDateAtUSN: 2023-02-13 23:15:00 UTC | ||
1070 | 1 | Candidate: CVE-2023-0801 | 2 | Candidate: CVE-2023-0801 |
1071 | 2 | PublicDate: 2023-02-13 23:15:00 UTC | 3 | PublicDate: 2023-02-13 23:15:00 UTC |
1072 | 3 | References: | 4 | References: |
1073 | @@ -5,6 +6,7 @@ References: | |||
1074 | 5 | https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00 | 6 | https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00 |
1075 | 6 | https://gitlab.com/libtiff/libtiff/-/issues/498 | 7 | https://gitlab.com/libtiff/libtiff/-/issues/498 |
1076 | 7 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0801.json | 8 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0801.json |
1077 | 9 | https://ubuntu.com/security/notices/USN-5923-1 | ||
1078 | 8 | Description: | 10 | Description: |
1079 | 9 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in | 11 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in |
1080 | 10 | libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and | 12 | libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and |
1081 | @@ -23,12 +25,12 @@ CVSS: | |||
1082 | 23 | 25 | ||
1083 | 24 | Patches_tiff: | 26 | Patches_tiff: |
1084 | 25 | upstream_tiff: needs-triage | 27 | upstream_tiff: needs-triage |
1086 | 26 | esm-infra/xenial_tiff: needed | 28 | esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10) |
1087 | 27 | trusty_tiff: ignored (out of standard support) | 29 | trusty_tiff: ignored (out of standard support) |
1088 | 28 | xenial_tiff: ignored (out of standard support) | 30 | xenial_tiff: ignored (out of standard support) |
1094 | 29 | bionic_tiff: needed | 31 | bionic_tiff: released (4.0.9-5ubuntu0.10) |
1095 | 30 | focal_tiff: needed | 32 | focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8) |
1096 | 31 | jammy_tiff: needed | 33 | jammy_tiff: released (4.3.0-6ubuntu0.4) |
1097 | 32 | kinetic_tiff: needed | 34 | kinetic_tiff: released (4.4.0-4ubuntu3.3) |
1098 | 33 | trusty/esm_tiff: needed | 35 | trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7) |
1099 | 34 | devel_tiff: needed | 36 | devel_tiff: needed |
1100 | diff --git a/active/CVE-2023-0802 b/active/CVE-2023-0802 | |||
1101 | index fc74216..6f171af 100644 | |||
1102 | --- a/active/CVE-2023-0802 | |||
1103 | +++ b/active/CVE-2023-0802 | |||
1104 | @@ -1,3 +1,4 @@ | |||
1105 | 1 | PublicDateAtUSN: 2023-02-13 23:15:00 UTC | ||
1106 | 1 | Candidate: CVE-2023-0802 | 2 | Candidate: CVE-2023-0802 |
1107 | 2 | PublicDate: 2023-02-13 23:15:00 UTC | 3 | PublicDate: 2023-02-13 23:15:00 UTC |
1108 | 3 | References: | 4 | References: |
1109 | @@ -5,6 +6,7 @@ References: | |||
1110 | 5 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0802.json | 6 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0802.json |
1111 | 6 | https://gitlab.com/libtiff/libtiff/-/issues/500 | 7 | https://gitlab.com/libtiff/libtiff/-/issues/500 |
1112 | 7 | https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00 | 8 | https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00 |
1113 | 9 | https://ubuntu.com/security/notices/USN-5923-1 | ||
1114 | 8 | Description: | 10 | Description: |
1115 | 9 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in | 11 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in |
1116 | 10 | tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via | 12 | tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via |
1117 | @@ -22,12 +24,12 @@ CVSS: | |||
1118 | 22 | 24 | ||
1119 | 23 | Patches_tiff: | 25 | Patches_tiff: |
1120 | 24 | upstream_tiff: needs-triage | 26 | upstream_tiff: needs-triage |
1122 | 25 | esm-infra/xenial_tiff: needed | 27 | esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10) |
1123 | 26 | trusty_tiff: ignored (out of standard support) | 28 | trusty_tiff: ignored (out of standard support) |
1124 | 27 | xenial_tiff: ignored (out of standard support) | 29 | xenial_tiff: ignored (out of standard support) |
1130 | 28 | bionic_tiff: needed | 30 | bionic_tiff: released (4.0.9-5ubuntu0.10) |
1131 | 29 | focal_tiff: needed | 31 | focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8) |
1132 | 30 | jammy_tiff: needed | 32 | jammy_tiff: released (4.3.0-6ubuntu0.4) |
1133 | 31 | kinetic_tiff: needed | 33 | kinetic_tiff: released (4.4.0-4ubuntu3.3) |
1134 | 32 | trusty/esm_tiff: needed | 34 | trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7) |
1135 | 33 | devel_tiff: needed | 35 | devel_tiff: needed |
1136 | diff --git a/active/CVE-2023-0803 b/active/CVE-2023-0803 | |||
1137 | index a6c66ad..8d7afc4 100644 | |||
1138 | --- a/active/CVE-2023-0803 | |||
1139 | +++ b/active/CVE-2023-0803 | |||
1140 | @@ -1,3 +1,4 @@ | |||
1141 | 1 | PublicDateAtUSN: 2023-02-13 23:15:00 UTC | ||
1142 | 1 | Candidate: CVE-2023-0803 | 2 | Candidate: CVE-2023-0803 |
1143 | 2 | PublicDate: 2023-02-13 23:15:00 UTC | 3 | PublicDate: 2023-02-13 23:15:00 UTC |
1144 | 3 | References: | 4 | References: |
1145 | @@ -5,6 +6,7 @@ References: | |||
1146 | 5 | https://gitlab.com/libtiff/libtiff/-/issues/501 | 6 | https://gitlab.com/libtiff/libtiff/-/issues/501 |
1147 | 6 | https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00 | 7 | https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00 |
1148 | 7 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0803.json | 8 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0803.json |
1149 | 9 | https://ubuntu.com/security/notices/USN-5923-1 | ||
1150 | 8 | Description: | 10 | Description: |
1151 | 9 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in | 11 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in |
1152 | 10 | tools/tiffcrop.c:3516, allowing attackers to cause a denial-of-service via | 12 | tools/tiffcrop.c:3516, allowing attackers to cause a denial-of-service via |
1153 | @@ -22,12 +24,12 @@ CVSS: | |||
1154 | 22 | 24 | ||
1155 | 23 | Patches_tiff: | 25 | Patches_tiff: |
1156 | 24 | upstream_tiff: needs-triage | 26 | upstream_tiff: needs-triage |
1158 | 25 | esm-infra/xenial_tiff: needed | 27 | esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10) |
1159 | 26 | trusty_tiff: ignored (out of standard support) | 28 | trusty_tiff: ignored (out of standard support) |
1160 | 27 | xenial_tiff: ignored (out of standard support) | 29 | xenial_tiff: ignored (out of standard support) |
1166 | 28 | bionic_tiff: needed | 30 | bionic_tiff: released (4.0.9-5ubuntu0.10) |
1167 | 29 | focal_tiff: needed | 31 | focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8) |
1168 | 30 | jammy_tiff: needed | 32 | jammy_tiff: released (4.3.0-6ubuntu0.4) |
1169 | 31 | kinetic_tiff: needed | 33 | kinetic_tiff: released (4.4.0-4ubuntu3.3) |
1170 | 32 | trusty/esm_tiff: needed | 34 | trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7) |
1171 | 33 | devel_tiff: needed | 35 | devel_tiff: needed |
1172 | diff --git a/active/CVE-2023-0804 b/active/CVE-2023-0804 | |||
1173 | index ca75e81..465e815 100644 | |||
1174 | --- a/active/CVE-2023-0804 | |||
1175 | +++ b/active/CVE-2023-0804 | |||
1176 | @@ -1,3 +1,4 @@ | |||
1177 | 1 | PublicDateAtUSN: 2023-02-13 23:15:00 UTC | ||
1178 | 1 | Candidate: CVE-2023-0804 | 2 | Candidate: CVE-2023-0804 |
1179 | 2 | PublicDate: 2023-02-13 23:15:00 UTC | 3 | PublicDate: 2023-02-13 23:15:00 UTC |
1180 | 3 | References: | 4 | References: |
1181 | @@ -5,6 +6,7 @@ References: | |||
1182 | 5 | https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00 | 6 | https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00 |
1183 | 6 | https://gitlab.com/libtiff/libtiff/-/issues/497 | 7 | https://gitlab.com/libtiff/libtiff/-/issues/497 |
1184 | 7 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0804.json | 8 | https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0804.json |
1185 | 9 | https://ubuntu.com/security/notices/USN-5923-1 | ||
1186 | 8 | Description: | 10 | Description: |
1187 | 9 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in | 11 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in |
1188 | 10 | tools/tiffcrop.c:3609, allowing attackers to cause a denial-of-service via | 12 | tools/tiffcrop.c:3609, allowing attackers to cause a denial-of-service via |
1189 | @@ -22,12 +24,12 @@ CVSS: | |||
1190 | 22 | 24 | ||
1191 | 23 | Patches_tiff: | 25 | Patches_tiff: |
1192 | 24 | upstream_tiff: needs-triage | 26 | upstream_tiff: needs-triage |
1194 | 25 | esm-infra/xenial_tiff: needed | 27 | esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10) |
1195 | 26 | trusty_tiff: ignored (out of standard support) | 28 | trusty_tiff: ignored (out of standard support) |
1196 | 27 | xenial_tiff: ignored (out of standard support) | 29 | xenial_tiff: ignored (out of standard support) |
1202 | 28 | bionic_tiff: needed | 30 | bionic_tiff: released (4.0.9-5ubuntu0.10) |
1203 | 29 | focal_tiff: needed | 31 | focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8) |
1204 | 30 | jammy_tiff: needed | 32 | jammy_tiff: released (4.3.0-6ubuntu0.4) |
1205 | 31 | trusty/esm_tiff: needed | 33 | trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7) |
1206 | 32 | kinetic_tiff: needed | 34 | kinetic_tiff: released (4.4.0-4ubuntu3.3) |
1207 | 33 | devel_tiff: needed | 35 | devel_tiff: needed |
1208 | diff --git a/active/CVE-2023-23455 b/active/CVE-2023-23455 | |||
1209 | index e2cbebb..23cd932 100644 | |||
1210 | --- a/active/CVE-2023-23455 | |||
1211 | +++ b/active/CVE-2023-23455 | |||
1212 | @@ -10,6 +10,7 @@ References: | |||
1213 | 10 | https://ubuntu.com/security/notices/USN-5915-1 | 10 | https://ubuntu.com/security/notices/USN-5915-1 |
1214 | 11 | https://ubuntu.com/security/notices/USN-5917-1 | 11 | https://ubuntu.com/security/notices/USN-5917-1 |
1215 | 12 | https://ubuntu.com/security/notices/USN-5924-1 | 12 | https://ubuntu.com/security/notices/USN-5924-1 |
1216 | 13 | https://ubuntu.com/security/notices/USN-5927-1 | ||
1217 | 13 | Description: | 14 | Description: |
1218 | 14 | atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 | 15 | atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 |
1219 | 15 | allows attackers to cause a denial of service because of type confusion | 16 | allows attackers to cause a denial of service because of type confusion |
1220 | @@ -231,7 +232,7 @@ Patches_linux-azure-4.15: | |||
1221 | 231 | upstream_linux-azure-4.15: released (6.2~rc3) | 232 | upstream_linux-azure-4.15: released (6.2~rc3) |
1222 | 232 | trusty_linux-azure-4.15: DNE | 233 | trusty_linux-azure-4.15: DNE |
1223 | 233 | xenial_linux-azure-4.15: DNE | 234 | xenial_linux-azure-4.15: DNE |
1225 | 234 | bionic_linux-azure-4.15: pending (4.15.0-1162.177) | 235 | bionic_linux-azure-4.15: released (4.15.0-1162.177) |
1226 | 235 | focal_linux-azure-4.15: DNE | 236 | focal_linux-azure-4.15: DNE |
1227 | 236 | jammy_linux-azure-4.15: DNE | 237 | jammy_linux-azure-4.15: DNE |
1228 | 237 | kinetic_linux-azure-4.15: DNE | 238 | kinetic_linux-azure-4.15: DNE |
1229 | diff --git a/active/CVE-2023-23559 b/active/CVE-2023-23559 | |||
1230 | index c54692a..8987ae0 100644 | |||
1231 | --- a/active/CVE-2023-23559 | |||
1232 | +++ b/active/CVE-2023-23559 | |||
1233 | @@ -6,6 +6,8 @@ References: | |||
1234 | 6 | https://patchwork.kernel.org/project/linux-wireless/patch/20230110173007.57110-1-szymon.heidrich@gmail.com/ | 6 | https://patchwork.kernel.org/project/linux-wireless/patch/20230110173007.57110-1-szymon.heidrich@gmail.com/ |
1235 | 7 | https://ubuntu.com/security/notices/USN-5884-1 | 7 | https://ubuntu.com/security/notices/USN-5884-1 |
1236 | 8 | https://ubuntu.com/security/notices/USN-5924-1 | 8 | https://ubuntu.com/security/notices/USN-5924-1 |
1237 | 9 | https://ubuntu.com/security/notices/USN-5926-1 | ||
1238 | 10 | https://ubuntu.com/security/notices/USN-5927-1 | ||
1239 | 9 | Description: | 11 | Description: |
1240 | 10 | In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel | 12 | In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel |
1241 | 11 | through 6.1.5, there is an integer overflow in an addition. | 13 | through 6.1.5, there is an integer overflow in an addition. |
1242 | @@ -26,7 +28,7 @@ CVSS: | |||
1243 | 26 | Patches_linux: | 28 | Patches_linux: |
1244 | 27 | break-fix: 80f8c5b434f94926c6489d7350d58aecb53ab70f b870e73a56c4cccbec33224233eaf295839f228c | 29 | break-fix: 80f8c5b434f94926c6489d7350d58aecb53ab70f b870e73a56c4cccbec33224233eaf295839f228c |
1245 | 28 | upstream_linux: released (6.2~rc5) | 30 | upstream_linux: released (6.2~rc5) |
1247 | 29 | esm-infra/xenial_linux: pending | 31 | esm-infra/xenial_linux: released (4.4.0-237.271) |
1248 | 30 | trusty_linux: ignored (out of standard support) | 32 | trusty_linux: ignored (out of standard support) |
1249 | 31 | xenial_linux: ignored (out of standard support) | 33 | xenial_linux: ignored (out of standard support) |
1250 | 32 | bionic_linux: pending (4.15.0-207.218) | 34 | bionic_linux: pending (4.15.0-207.218) |
1251 | @@ -109,11 +111,11 @@ bionic_linux-lts-xenial: DNE | |||
1252 | 109 | focal_linux-lts-xenial: DNE | 111 | focal_linux-lts-xenial: DNE |
1253 | 110 | jammy_linux-lts-xenial: DNE | 112 | jammy_linux-lts-xenial: DNE |
1254 | 111 | kinetic_linux-lts-xenial: DNE | 113 | kinetic_linux-lts-xenial: DNE |
1256 | 112 | trusty/esm_linux-lts-xenial: pending | 114 | trusty/esm_linux-lts-xenial: released (4.4.0-237.271~14.04.1) |
1257 | 113 | 115 | ||
1258 | 114 | Patches_linux-kvm: | 116 | Patches_linux-kvm: |
1259 | 115 | upstream_linux-kvm: released (6.2~rc5) | 117 | upstream_linux-kvm: released (6.2~rc5) |
1261 | 116 | esm-infra/xenial_linux-kvm: pending | 118 | esm-infra/xenial_linux-kvm: released (4.4.0-1117.127) |
1262 | 117 | trusty_linux-kvm: DNE | 119 | trusty_linux-kvm: DNE |
1263 | 118 | xenial_linux-kvm: ignored (end of standard support) | 120 | xenial_linux-kvm: ignored (end of standard support) |
1264 | 119 | bionic_linux-kvm: needed | 121 | bionic_linux-kvm: needed |
1265 | @@ -131,7 +133,7 @@ bionic_linux-aws: needed | |||
1266 | 131 | focal_linux-aws: needed | 133 | focal_linux-aws: needed |
1267 | 132 | jammy_linux-aws: needed | 134 | jammy_linux-aws: needed |
1268 | 133 | kinetic_linux-aws: needed | 135 | kinetic_linux-aws: needed |
1270 | 134 | trusty/esm_linux-aws: pending | 136 | trusty/esm_linux-aws: released (4.4.0-1116.122) |
1271 | 135 | devel_linux-aws: needed | 137 | devel_linux-aws: needed |
1272 | 136 | 138 | ||
1273 | 137 | Patches_linux-aws-5.0: | 139 | Patches_linux-aws-5.0: |
1274 | @@ -223,7 +225,7 @@ Patches_linux-azure-4.15: | |||
1275 | 223 | upstream_linux-azure-4.15: released (6.2~rc5) | 225 | upstream_linux-azure-4.15: released (6.2~rc5) |
1276 | 224 | trusty_linux-azure-4.15: DNE | 226 | trusty_linux-azure-4.15: DNE |
1277 | 225 | xenial_linux-azure-4.15: DNE | 227 | xenial_linux-azure-4.15: DNE |
1279 | 226 | bionic_linux-azure-4.15: pending (4.15.0-1162.177) | 228 | bionic_linux-azure-4.15: released (4.15.0-1162.177) |
1280 | 227 | focal_linux-azure-4.15: DNE | 229 | focal_linux-azure-4.15: DNE |
1281 | 228 | jammy_linux-azure-4.15: DNE | 230 | jammy_linux-azure-4.15: DNE |
1282 | 229 | kinetic_linux-azure-4.15: DNE | 231 | kinetic_linux-azure-4.15: DNE |
1283 | diff --git a/scripts/packages-mirror b/scripts/packages-mirror | |||
1284 | index 3b08dc1..6bac3b4 100755 | |||
1285 | --- a/scripts/packages-mirror | |||
1286 | +++ b/scripts/packages-mirror | |||
1287 | @@ -18,6 +18,7 @@ help() { | |||
1288 | 18 | cat <<EOM | 18 | cat <<EOM |
1289 | 19 | Usage: packages_mirror [OPTIONS] | 19 | Usage: packages_mirror [OPTIONS] |
1290 | 20 | 20 | ||
1291 | 21 | -w use wget instead of rsync to fetch the mirror contents | ||
1292 | 21 | -t use timestamps (ie, don't update files if they have been | 22 | -t use timestamps (ie, don't update files if they have been |
1293 | 22 | updated within the last day) | 23 | updated within the last day) |
1294 | 23 | -f when using timestamps, force updating the files | 24 | -f when using timestamps, force updating the files |
1295 | @@ -31,9 +32,10 @@ EOM | |||
1296 | 31 | } | 32 | } |
1297 | 32 | 33 | ||
1298 | 33 | find_devel_release() { | 34 | find_devel_release() { |
1300 | 34 | PYTHONPATH="$(dirname $0)" python3 -c "import cve_lib; print(cve_lib.devel_release)" || true | 35 | PYTHONPATH="$(dirname "$0")" python3 -c "import cve_lib; print(cve_lib.devel_release)" || true |
1301 | 35 | } | 36 | } |
1302 | 36 | 37 | ||
1303 | 38 | use_wget="no" | ||
1304 | 37 | use_timestamp="no" | 39 | use_timestamp="no" |
1305 | 38 | force_timestamp="no" | 40 | force_timestamp="no" |
1306 | 39 | verbosity_args="-q" | 41 | verbosity_args="-q" |
1307 | @@ -43,9 +45,10 @@ very_verbose="" | |||
1308 | 43 | only_partner="no" | 45 | only_partner="no" |
1309 | 44 | only_ubuntu="no" | 46 | only_ubuntu="no" |
1310 | 45 | 47 | ||
1312 | 46 | while getopts "AhftvVpur:" opt | 48 | while getopts "AwhftvVpur:" opt |
1313 | 47 | do | 49 | do |
1314 | 48 | case "$opt" in | 50 | case "$opt" in |
1315 | 51 | w) use_wget="yes";; | ||
1316 | 49 | f) force_timestamp="yes";; | 52 | f) force_timestamp="yes";; |
1317 | 50 | t) use_timestamp="yes";; | 53 | t) use_timestamp="yes";; |
1318 | 51 | v) verbosity_args="";; | 54 | v) verbosity_args="";; |
1319 | @@ -63,9 +66,11 @@ shift $((OPTIND - 1)) | |||
1320 | 63 | 66 | ||
1321 | 64 | #server=se.archive.ubuntu.com | 67 | #server=se.archive.ubuntu.com |
1322 | 65 | #server=us.archive.ubuntu.com | 68 | #server=us.archive.ubuntu.com |
1324 | 66 | server=archive.ubuntu.com | 69 | server=${server:-archive.ubuntu.com} |
1325 | 67 | ports=${ports:-ports.ubuntu.com} | 70 | ports=${ports:-ports.ubuntu.com} |
1326 | 71 | debian=${debian:-ftp.debian.org} | ||
1327 | 68 | 72 | ||
1328 | 73 | # shellcheck disable=SC1091 | ||
1329 | 69 | . "$HOME"/.ubuntu-cve-tracker.conf | 74 | . "$HOME"/.ubuntu-cve-tracker.conf |
1330 | 70 | 75 | ||
1331 | 71 | for var in packages_mirror debian_mirror partner_mirror; do | 76 | for var in packages_mirror debian_mirror partner_mirror; do |
1332 | @@ -74,16 +79,19 @@ for var in packages_mirror debian_mirror partner_mirror; do | |||
1333 | 74 | exit 1 | 79 | exit 1 |
1334 | 75 | fi | 80 | fi |
1335 | 76 | done | 81 | done |
1336 | 82 | # shellcheck disable=SC2154 | ||
1337 | 77 | outPath=$packages_mirror | 83 | outPath=$packages_mirror |
1338 | 78 | mkdir -p "$outPath" | 84 | mkdir -p "$outPath" |
1339 | 79 | 85 | ||
1340 | 86 | # shellcheck disable=SC2154 | ||
1341 | 80 | debianPath=$debian_mirror | 87 | debianPath=$debian_mirror |
1342 | 81 | mkdir -p "$debianPath" | 88 | mkdir -p "$debianPath" |
1343 | 82 | 89 | ||
1344 | 90 | # shellcheck disable=SC2154 | ||
1345 | 83 | partnerPath=$partner_mirror | 91 | partnerPath=$partner_mirror |
1346 | 84 | mkdir -p "$partnerPath" | 92 | mkdir -p "$partnerPath" |
1347 | 85 | 93 | ||
1349 | 86 | partner_dir_excludes=$(PYTHONPATH="${PYTHONPATH:+$PYTHONPATH:}$(dirname $0)" python3 -c '# | 94 | partner_dir_excludes=$(PYTHONPATH="${PYTHONPATH:+$PYTHONPATH:}$(dirname "$0")" python3 -c '# |
1350 | 87 | import cve_lib, sys | 95 | import cve_lib, sys |
1351 | 88 | s = "" | 96 | s = "" |
1352 | 89 | for r in cve_lib.eol_releases + ["breezy", "warty", "hoary"]: | 97 | for r in cve_lib.eol_releases + ["breezy", "warty", "hoary"]: |
1353 | @@ -161,9 +169,9 @@ function gen_packages() | |||
1354 | 161 | do | 169 | do |
1355 | 162 | for arch in $arches | 170 | for arch in $arches |
1356 | 163 | do | 171 | do |
1358 | 164 | spew_bin_lines $rel $repo $arch | 172 | spew_bin_lines "$rel" "$repo" "$arch" |
1359 | 165 | done | 173 | done |
1361 | 166 | spew_src_lines $rel $repo | 174 | spew_src_lines "$rel" "$repo" |
1362 | 167 | done | 175 | done |
1363 | 168 | done | 176 | done |
1364 | 169 | } | 177 | } |
1365 | @@ -185,9 +193,21 @@ function pull_packages() | |||
1366 | 185 | log=$(mktemp -t rsync-XXXXXX) | 193 | log=$(mktemp -t rsync-XXXXXX) |
1367 | 186 | set +e | 194 | set +e |
1368 | 187 | if [ "$verbosity_args" != "-q" ]; then | 195 | if [ "$verbosity_args" != "-q" ]; then |
1370 | 188 | rsync -rlptv --progress --files-from="$filelist" $url $outPath/ 2>&1 | tee "$log" | 196 | if [ "$use_wget" != "no" ]; then |
1371 | 197 | # need to cut dirs to remove any extra dir prefixes | ||
1372 | 198 | cutdirs=$(echo "$url" | grep -o "/" | wc -l) | ||
1373 | 199 | wget -N -np -i "$filelist" --base "http://$url/" --directory-prefix "$outPath/" --force-directories --no-host-directories --cut-dirs="$cutdirs" 2>&1 | tee "$log" | ||
1374 | 200 | else | ||
1375 | 201 | rsync -rlptv --progress --files-from="$filelist" "rsync://$url" "$outPath/" 2>&1 | tee "$log" | ||
1376 | 202 | fi | ||
1377 | 189 | else | 203 | else |
1379 | 190 | rsync -rlptq --files-from="$filelist" $url $outPath/ >"$log" 2>&1 | 204 | if [ "$use_wget" != "no" ]; then |
1380 | 205 | # need to cut dirs to remove any extra dir prefixes | ||
1381 | 206 | cutdirs=$(echo "$url" | grep -o "/" | wc -l) | ||
1382 | 207 | wget --quiet -N -np -i "$filelist" --base "http://$url" --directory-prefix "$outPath/" --force-directories --no-host-directories --cut-dirs="$cutdirs" >"$log" 2>&1 | ||
1383 | 208 | else | ||
1384 | 209 | rsync -rlptq --files-from="$filelist" "rsync://$url" "$outPath/" >"$log" 2>&1 | ||
1385 | 210 | fi | ||
1386 | 191 | fi | 211 | fi |
1387 | 192 | rc=$? | 212 | rc=$? |
1388 | 193 | 213 | ||
1389 | @@ -196,9 +216,7 @@ function pull_packages() | |||
1390 | 196 | break | 216 | break |
1391 | 197 | fi | 217 | fi |
1392 | 198 | count=$((count + 1)) | 218 | count=$((count + 1)) |
1396 | 199 | if [ "$verbosity_args" != "-q" ]; then | 219 | echo "Try: $count (rc: $rc)" >&2 |
1394 | 200 | echo "Try: $count" >&2 | ||
1395 | 201 | fi | ||
1397 | 202 | done | 220 | done |
1398 | 203 | set -e | 221 | set -e |
1399 | 204 | OUT=$(< "$log" grep -Ev '(debian-installer|^rsync.*code 23)' || true) | 222 | OUT=$(< "$log" grep -Ev '(debian-installer|^rsync.*code 23)' || true) |
1400 | @@ -210,11 +228,14 @@ function pull_packages() | |||
1401 | 210 | fi | 228 | fi |
1402 | 211 | 229 | ||
1403 | 212 | # Some unknown error -- die | 230 | # Some unknown error -- die |
1405 | 213 | if [ $rc -ne 0 ] && [ $rc -ne 23 ]; then | 231 | if [ "$rc" -ne 0 ] && [ "$rc" -ne 23 ]; then |
1406 | 232 | echo "failed: rc: $rc" | ||
1407 | 214 | return 1 | 233 | return 1 |
1408 | 215 | fi | 234 | fi |
1409 | 216 | # Missing files (rc 23), die only if it's not a debian-installer path | 235 | # Missing files (rc 23), die only if it's not a debian-installer path |
1411 | 217 | if [ $rc -eq 23 ] && [ -n "$OUT" ]; then | 236 | if [ "$rc" -eq 23 ] && [ -n "$OUT" ]; then |
1412 | 237 | echo "failed: rc: $rc" | ||
1413 | 238 | echo "$OUT" | ||
1414 | 218 | return 1 | 239 | return 1 |
1415 | 219 | fi | 240 | fi |
1416 | 220 | 241 | ||
1417 | @@ -255,7 +276,7 @@ function do_use_timestamp() { | |||
1418 | 255 | elif [ ! -e "$1" ]; then | 276 | elif [ ! -e "$1" ]; then |
1419 | 256 | return 0 | 277 | return 0 |
1420 | 257 | else | 278 | else |
1422 | 258 | tmp=$(find "$1" -mtime +$mtime) | 279 | tmp=$(find "$1" -mtime "+$mtime") |
1423 | 259 | if [ -n "$tmp" ]; then | 280 | if [ -n "$tmp" ]; then |
1424 | 260 | return 0 | 281 | return 0 |
1425 | 261 | fi | 282 | fi |
1426 | @@ -269,27 +290,30 @@ if [ "$only_partner" = "no" ]; then | |||
1427 | 269 | timestamp="${outPath}.timestamp" | 290 | timestamp="${outPath}.timestamp" |
1428 | 270 | if [ ! -e "${outPath}/dists" ] || do_use_timestamp "$timestamp" ; then | 291 | if [ ! -e "${outPath}/dists" ] || do_use_timestamp "$timestamp" ; then |
1429 | 271 | pull=$(mktemp -t packages-XXXXXX) | 292 | pull=$(mktemp -t packages-XXXXXX) |
1430 | 293 | # shellcheck disable=SC2064 | ||
1431 | 272 | trap "rm -f $pull" EXIT HUP INT QUIT TERM | 294 | trap "rm -f $pull" EXIT HUP INT QUIT TERM |
1432 | 273 | 295 | ||
1433 | 274 | # Sync Packages for non-ports supported arches | 296 | # Sync Packages for non-ports supported arches |
1434 | 275 | if [ "$verbosity_args" != "-q" ]; then | 297 | if [ "$verbosity_args" != "-q" ]; then |
1435 | 276 | echo "Generating arch lists" | 298 | echo "Generating arch lists" |
1436 | 277 | fi | 299 | fi |
1437 | 300 | # shellcheck disable=SC2129 | ||
1438 | 278 | gen_packages trusty "amd64 i386" >> "$pull" | 301 | gen_packages trusty "amd64 i386" >> "$pull" |
1439 | 279 | gen_packages xenial "amd64 i386" >> "$pull" | 302 | gen_packages xenial "amd64 i386" >> "$pull" |
1440 | 280 | gen_packages bionic "amd64 i386" >> "$pull" | 303 | gen_packages bionic "amd64 i386" >> "$pull" |
1441 | 281 | gen_packages focal "amd64 i386" >> "$pull" | 304 | gen_packages focal "amd64 i386" >> "$pull" |
1442 | 282 | gen_packages jammy "amd64 i386" >> "$pull" | 305 | gen_packages jammy "amd64 i386" >> "$pull" |
1443 | 283 | gen_packages kinetic "amd64 i386" >> "$pull" | 306 | gen_packages kinetic "amd64 i386" >> "$pull" |
1445 | 284 | gen_packages lunar "amd64 i386" >> "$pull" | 307 | gen_packages lunar "amd64 i386" >> "$pull" |
1446 | 285 | 308 | ||
1448 | 286 | pull_packages "$pull" rsync://$server/ubuntu || echo "FAIL: supported architectures" >&2 | 309 | pull_packages "$pull" "$server/ubuntu" || echo "FAIL: supported architectures" >&2 |
1449 | 287 | cat /dev/null > "$pull" | 310 | cat /dev/null > "$pull" |
1450 | 288 | 311 | ||
1451 | 289 | # Sync Packages for ports arches | 312 | # Sync Packages for ports arches |
1452 | 290 | if [ "$verbosity_args" != "-q" ]; then | 313 | if [ "$verbosity_args" != "-q" ]; then |
1453 | 291 | echo "Generating ports arch lists" | 314 | echo "Generating ports arch lists" |
1454 | 292 | fi | 315 | fi |
1455 | 316 | # shellcheck disable=SC2129 | ||
1456 | 293 | gen_packages trusty "powerpc ppc64el armhf arm64" >> "$pull" | 317 | gen_packages trusty "powerpc ppc64el armhf arm64" >> "$pull" |
1457 | 294 | gen_packages xenial "powerpc ppc64el armhf arm64 s390x" >> "$pull" | 318 | gen_packages xenial "powerpc ppc64el armhf arm64 s390x" >> "$pull" |
1458 | 295 | gen_packages bionic "ppc64el armhf arm64 s390x" >> "$pull" | 319 | gen_packages bionic "ppc64el armhf arm64 s390x" >> "$pull" |
1459 | @@ -298,7 +322,7 @@ if [ "$only_partner" = "no" ]; then | |||
1460 | 298 | gen_packages kinetic "ppc64el armhf arm64 s390x riscv64" >> "$pull" | 322 | gen_packages kinetic "ppc64el armhf arm64 s390x riscv64" >> "$pull" |
1461 | 299 | gen_packages lunar "ppc64el armhf arm64 s390x riscv64" >> "$pull" | 323 | gen_packages lunar "ppc64el armhf arm64 s390x riscv64" >> "$pull" |
1462 | 300 | 324 | ||
1464 | 301 | pull_packages "$pull" rsync://$ports/ubuntu-ports || echo "FAIL: ports architectures" >&2 | 325 | pull_packages "$pull" "$ports/ubuntu-ports" || echo "FAIL: ports architectures" >&2 |
1465 | 302 | cat /dev/null > "$pull" | 326 | cat /dev/null > "$pull" |
1466 | 303 | 327 | ||
1467 | 304 | if [ "$use_timestamp" = "yes" ]; then | 328 | if [ "$use_timestamp" = "yes" ]; then |
1468 | @@ -325,11 +349,11 @@ if [ "$only_ubuntu" = "no" ]; then | |||
1469 | 325 | cd "$debianPath" | 349 | cd "$debianPath" |
1470 | 326 | for i in main contrib non-free | 350 | for i in main contrib non-free |
1471 | 327 | do | 351 | do |
1473 | 328 | wget $verbosity_args -N -R '*=*' -R 'Contents*' -X '/debian/dists/testing/*/source/Sources.diff,/debian/dists/testing/*/source/by-hash' -np -r http://ftp.debian.org/debian/dists/testing/$i/source/ | 352 | wget $verbosity_args -N -R '*=*' -R 'Contents*' -X '/debian/dists/testing/*/source/Sources.diff,/debian/dists/testing/*/source/by-hash' -np -r "http://$debian/debian/dists/testing/$i/source/" |
1474 | 329 | done | 353 | done |
1476 | 330 | ln -sf ftp.debian.org/debian/dists dists | 354 | ln -sf "$debian/debian/dists" dists |
1477 | 331 | # remove dangling symlink | 355 | # remove dangling symlink |
1479 | 332 | rm -f ftp.debian.org/debian/dists/dists || true | 356 | rm -f "$debian/debian/dists/dists" || true |
1480 | 333 | 357 | ||
1481 | 334 | if [ "$use_timestamp" = "yes" ]; then | 358 | if [ "$use_timestamp" = "yes" ]; then |
1482 | 335 | touch "$timestamp" | 359 | touch "$timestamp" |
1483 | @@ -360,7 +384,7 @@ if [ "$only_ubuntu" = "no" ]; then | |||
1484 | 360 | rm -f "$timestamp" | 384 | rm -f "$timestamp" |
1485 | 361 | fi | 385 | fi |
1486 | 362 | has_sources=$(find archive.canonical.com/dists -name Sources$) | 386 | has_sources=$(find archive.canonical.com/dists -name Sources$) |
1488 | 363 | if [ ! -z "$has_sources" ]; then | 387 | if [ -n "$has_sources" ]; then |
1489 | 364 | echo "" | 388 | echo "" |
1490 | 365 | echo "WARNING: $partnerPath has Sources files! These should be removed now that -partner uses Sources.gz" | 389 | echo "WARNING: $partnerPath has Sources files! These should be removed now that -partner uses Sources.gz" |
1491 | 366 | fi | 390 | fi |
1492 | @@ -370,5 +394,5 @@ fi | |||
1493 | 370 | 394 | ||
1494 | 371 | # generate source package lists for umt grep | 395 | # generate source package lists for umt grep |
1495 | 372 | for path in "$outPath" "$debianPath" "$partnerPath"; do | 396 | for path in "$outPath" "$debianPath" "$partnerPath"; do |
1497 | 373 | find $path -name Sources.gz -exec zgrep '^Package: .*' {} \; | cut -c10- | sort -u > $path/sources | 397 | find "$path" -name Sources.gz -exec zgrep '^Package: .*' {} \; | cut -c10- | sort -u > "$path/sources" |
1498 | 374 | done | 398 | done |
Merging this now since it works *and* currently appears to be green. Hopefully we can keep it that way.