Merge ~alexmurray/ubuntu-cve-tracker:launchpad-yaml-for-check-syntax into ubuntu-cve-tracker:master

Proposed by Alex Murray
Status: Merged
Merged at revision: cd6fc6d4873bee751cc6452dfb04a4a3d21b5f5e
Proposed branch: ~alexmurray/ubuntu-cve-tracker:launchpad-yaml-for-check-syntax
Merge into: ubuntu-cve-tracker:master
Diff against target: 1498 lines (+277/-150)
35 files modified
.launchpad.yaml (+50/-0)
active/CVE-2021-33621 (+1/-1)
active/CVE-2021-3669 (+2/-1)
active/CVE-2021-4155 (+5/-4)
active/CVE-2021-43618 (+2/-1)
active/CVE-2022-20566 (+5/-4)
active/CVE-2022-3424 (+2/-1)
active/CVE-2022-3521 (+6/-4)
active/CVE-2022-3545 (+6/-4)
active/CVE-2022-3628 (+6/-4)
active/CVE-2022-36280 (+2/-1)
active/CVE-2022-3640 (+6/-4)
active/CVE-2022-41218 (+2/-1)
active/CVE-2022-41858 (+5/-4)
active/CVE-2022-42328 (+6/-4)
active/CVE-2022-42329 (+6/-4)
active/CVE-2022-42895 (+11/-8)
active/CVE-2022-47929 (+2/-1)
active/CVE-2023-0045 (+7/-5)
active/CVE-2023-0266 (+2/-1)
active/CVE-2023-0394 (+2/-1)
active/CVE-2023-0461 (+6/-4)
active/CVE-2023-0795 (+8/-6)
active/CVE-2023-0796 (+8/-6)
active/CVE-2023-0797 (+8/-6)
active/CVE-2023-0798 (+8/-6)
active/CVE-2023-0799 (+8/-6)
active/CVE-2023-0800 (+8/-6)
active/CVE-2023-0801 (+8/-6)
active/CVE-2023-0802 (+8/-6)
active/CVE-2023-0803 (+8/-6)
active/CVE-2023-0804 (+8/-6)
active/CVE-2023-23455 (+2/-1)
active/CVE-2023-23559 (+7/-5)
scripts/packages-mirror (+46/-22)
Reviewer Review Type Date Requested Status
Ubuntu Security Team Pending
Review via email: mp+432413@code.launchpad.net
To post a comment you must log in.
Revision history for this message
Alex Murray (alexmurray) wrote :

Merging this now since it works *and* currently appears to be green. Hopefully we can keep it that way.

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
diff --git a/.launchpad.yaml b/.launchpad.yaml
0new file mode 1006440new file mode 100644
index 0000000..1773ff9
--- /dev/null
+++ b/.launchpad.yaml
@@ -0,0 +1,50 @@
1license:
2 spdx: GPL-3.0
3
4pipeline:
5 - tests
6jobs:
7 tests:
8 series: jammy
9 architectures: amd64
10 packages:
11 - distro-info
12 - lsb-release
13 - python3
14 - python3-apt
15 - python3-configobj
16 - python3-progressbar
17 - python3-pytest
18 - python3-yaml
19 - rsync
20 - wget
21 run-before: |
22 # configure a basic ~/.ubuntu-cve-tracker.conf and setup packages-mirror
23 # for source_map
24 echo plb_authentication=/dev/null > ~/.ubuntu-cve-tracker.conf
25 echo "packages_mirror=$HOME/mirrors/ubuntu/" >> ~/.ubuntu-cve-tracker.conf
26 for mirror in debian partner; do
27 echo "${mirror}_mirror=$HOME/mirrors/${mirror}/" >> ~/.ubuntu-cve-tracker.conf
28 done
29 echo "Setting up packages-mirror..."
30 # use wget for packages-mirror since rsync is not accessible in lp
31 # builders - also invoke with -v since this seems to make downloading more
32 # reliable (probably slows down wget or somesuch to it doesn't thrash the
33 # internal mirror)
34 echo "./scripts/packages-mirror -w -v"
35 ./scripts/packages-mirror -w -v
36 run: |
37 export UCT=$(pwd)
38 # when lpcraft runs on a local users machine where embargoed already
39 # exists as a symlink it won't point to anywhere so remove that and fake a
40 # new one
41 rm -f embargoed
42 mkdir embargoed
43 echo "Running unit tests..."
44 ./scripts/test_cve_lib.py
45 ./scripts/test_kernel_lib.py
46 ./scripts/test_usn_lib.py
47 ./scripts/check-cves --test
48
49 echo "Checking syntax..."
50 ./scripts/check-syntax
diff --git a/active/CVE-2021-33621 b/active/CVE-2021-33621
index aef178b..eaecb69 100644
--- a/active/CVE-2021-33621
+++ b/active/CVE-2021-33621
@@ -86,7 +86,7 @@ bionic_ruby3.0: DNE
86focal_ruby3.0: DNE86focal_ruby3.0: DNE
87jammy_ruby3.0: released (3.0.2-7ubuntu2.3)87jammy_ruby3.0: released (3.0.2-7ubuntu2.3)
88kinetic_ruby3.0: released (3.0.4-7ubuntu0.1)88kinetic_ruby3.0: released (3.0.4-7ubuntu0.1)
89devel_ruby3.0: released (3.0.4-8ubuntu1)89devel_ruby3.0: DNE
9090
91Patches_ruby3.1:91Patches_ruby3.1:
92upstream_ruby3.1: released (3.1.2-4)92upstream_ruby3.1: released (3.1.2-4)
diff --git a/active/CVE-2021-3669 b/active/CVE-2021-3669
index 7f48f42..0657603 100644
--- a/active/CVE-2021-3669
+++ b/active/CVE-2021-3669
@@ -5,6 +5,7 @@ References:
5 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36695 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669
6 https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/6 https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
7 https://ubuntu.com/security/notices/USN-5924-17 https://ubuntu.com/security/notices/USN-5924-1
8 https://ubuntu.com/security/notices/USN-5927-1
8Description:9Description:
9 A flaw was found in the Linux kernel. Measuring usage of the shared memory10 A flaw was found in the Linux kernel. Measuring usage of the shared memory
10 does not scale with large shared memory segment counts which could lead to11 does not scale with large shared memory segment counts which could lead to
@@ -222,7 +223,7 @@ upstream_linux-azure-4.15: released (5.15~rc1)
222trusty_linux-azure-4.15: DNE223trusty_linux-azure-4.15: DNE
223trusty/esm_linux-azure-4.15: DNE224trusty/esm_linux-azure-4.15: DNE
224xenial_linux-azure-4.15: DNE225xenial_linux-azure-4.15: DNE
225bionic_linux-azure-4.15: needed226bionic_linux-azure-4.15: released (4.15.0-1162.177)
226focal_linux-azure-4.15: DNE227focal_linux-azure-4.15: DNE
227hirsute_linux-azure-4.15: DNE228hirsute_linux-azure-4.15: DNE
228impish_linux-azure-4.15: DNE229impish_linux-azure-4.15: DNE
diff --git a/active/CVE-2021-4155 b/active/CVE-2021-4155
index 8055fd5..e60031b 100644
--- a/active/CVE-2021-4155
+++ b/active/CVE-2021-4155
@@ -14,6 +14,7 @@ References:
14 https://ubuntu.com/security/notices/USN-5298-114 https://ubuntu.com/security/notices/USN-5298-1
15 https://ubuntu.com/security/notices/USN-5362-115 https://ubuntu.com/security/notices/USN-5362-1
16 https://ubuntu.com/security/notices/USN-5884-116 https://ubuntu.com/security/notices/USN-5884-1
17 https://ubuntu.com/security/notices/USN-5926-1
17Description:18Description:
18 A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS19 A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS
19 filesystem allowed for size increase of files with unaligned size. A local20 filesystem allowed for size increase of files with unaligned size. A local
@@ -40,7 +41,7 @@ upstream_linux: released (5.16)
40trusty_linux: ignored (out of standard support)41trusty_linux: ignored (out of standard support)
41trusty/esm_linux: ignored (was needed ESM criteria)42trusty/esm_linux: ignored (was needed ESM criteria)
42xenial_linux: ignored (was needs-triage now end-of-life)43xenial_linux: ignored (was needs-triage now end-of-life)
43esm-infra/xenial_linux: pending44esm-infra/xenial_linux: released (4.4.0-237.271)
44bionic_linux: released (4.15.0-169.177)45bionic_linux: released (4.15.0-169.177)
45focal_linux: released (5.4.0-100.113)46focal_linux: released (5.4.0-100.113)
46hirsute_linux: ignored (reached end-of-life)47hirsute_linux: ignored (reached end-of-life)
@@ -120,7 +121,7 @@ devel_linux-hwe-edge: DNE
120Patches_linux-lts-xenial:121Patches_linux-lts-xenial:
121upstream_linux-lts-xenial: released (5.16)122upstream_linux-lts-xenial: released (5.16)
122trusty_linux-lts-xenial: ignored (out of standard support)123trusty_linux-lts-xenial: ignored (out of standard support)
123trusty/esm_linux-lts-xenial: pending124trusty/esm_linux-lts-xenial: released (4.4.0-237.271~14.04.1)
124xenial_linux-lts-xenial: DNE125xenial_linux-lts-xenial: DNE
125bionic_linux-lts-xenial: DNE126bionic_linux-lts-xenial: DNE
126focal_linux-lts-xenial: DNE127focal_linux-lts-xenial: DNE
@@ -135,7 +136,7 @@ upstream_linux-kvm: released (5.16)
135trusty_linux-kvm: DNE136trusty_linux-kvm: DNE
136trusty/esm_linux-kvm: DNE137trusty/esm_linux-kvm: DNE
137xenial_linux-kvm: ignored (was needs-triage now end-of-life)138xenial_linux-kvm: ignored (was needs-triage now end-of-life)
138esm-infra/xenial_linux-kvm: pending139esm-infra/xenial_linux-kvm: released (4.4.0-1117.127)
139bionic_linux-kvm: released (4.15.0-1107.109)140bionic_linux-kvm: released (4.15.0-1107.109)
140focal_linux-kvm: released (5.4.0-1056.58)141focal_linux-kvm: released (5.4.0-1056.58)
141hirsute_linux-kvm: ignored (reached end-of-life)142hirsute_linux-kvm: ignored (reached end-of-life)
@@ -147,7 +148,7 @@ devel_linux-kvm: not-affected (5.19.0-1008.8)
147Patches_linux-aws:148Patches_linux-aws:
148upstream_linux-aws: released (5.16)149upstream_linux-aws: released (5.16)
149trusty_linux-aws: ignored (out of standard support)150trusty_linux-aws: ignored (out of standard support)
150trusty/esm_linux-aws: pending151trusty/esm_linux-aws: released (4.4.0-1116.122)
151xenial_linux-aws: ignored (was needs-triage now end-of-life)152xenial_linux-aws: ignored (was needs-triage now end-of-life)
152esm-infra/xenial_linux-aws: released (4.4.0-1154.169)153esm-infra/xenial_linux-aws: released (4.4.0-1154.169)
153bionic_linux-aws: released (4.15.0-1121.129)154bionic_linux-aws: released (4.15.0-1121.129)
diff --git a/active/CVE-2021-43618 b/active/CVE-2021-43618
index 25d50fe..4902d72 100644
--- a/active/CVE-2021-43618
+++ b/active/CVE-2021-43618
@@ -5,6 +5,7 @@ References:
5 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-436185 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
6 https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html6 https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
7 https://ubuntu.com/security/notices/USN-5672-17 https://ubuntu.com/security/notices/USN-5672-1
8 https://ubuntu.com/security/notices/USN-5672-2
8Description:9Description:
9 GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an10 GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an
10 mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted11 mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted
@@ -25,7 +26,7 @@ CVSS:
25Patches_gmp:26Patches_gmp:
26 upstream: https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e27 upstream: https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
27upstream_gmp: released (2:6.2.1+dfsg-3)28upstream_gmp: released (2:6.2.1+dfsg-3)
28trusty/esm_gmp: needs-triage29trusty/esm_gmp: released (2:5.1.3+dfsg-1ubuntu1+esm1)
29esm-infra/xenial_gmp: released (2:6.1.0+dfsg-2ubuntu0.1~esm1)30esm-infra/xenial_gmp: released (2:6.1.0+dfsg-2ubuntu0.1~esm1)
30trusty_gmp: ignored (out of standard support)31trusty_gmp: ignored (out of standard support)
31xenial_gmp: ignored (out of standard support)32xenial_gmp: ignored (out of standard support)
diff --git a/active/CVE-2022-20566 b/active/CVE-2022-20566
index f575cbc..5ad5008 100644
--- a/active/CVE-2022-20566
+++ b/active/CVE-2022-20566
@@ -6,6 +6,7 @@ References:
6 https://git.kernel.org/linus/d0be8347c623e0ac4202a1d4e0373882821f56b06 https://git.kernel.org/linus/d0be8347c623e0ac4202a1d4e0373882821f56b0
7 https://ubuntu.com/security/notices/USN-5884-17 https://ubuntu.com/security/notices/USN-5884-1
8 https://ubuntu.com/security/notices/USN-5913-18 https://ubuntu.com/security/notices/USN-5913-1
9 https://ubuntu.com/security/notices/USN-5926-1
9Description:10Description:
10 In l2cap_chan_put of l2cap_core, there is a possible use after free due to11 In l2cap_chan_put of l2cap_core, there is a possible use after free due to
11 improper locking. This could lead to local escalation of privilege with no12 improper locking. This could lead to local escalation of privilege with no
@@ -29,7 +30,7 @@ CVSS:
29Patches_linux:30Patches_linux:
30 break-fix: 4af66c691f4e5c2db9bb00793669a548e9db1974 d0be8347c623e0ac4202a1d4e0373882821f56b031 break-fix: 4af66c691f4e5c2db9bb00793669a548e9db1974 d0be8347c623e0ac4202a1d4e0373882821f56b0
31upstream_linux: released (5.19)32upstream_linux: released (5.19)
32esm-infra/xenial_linux: pending33esm-infra/xenial_linux: released (4.4.0-237.271)
33trusty_linux: ignored (out of standard support)34trusty_linux: ignored (out of standard support)
34xenial_linux: ignored (out of standard support)35xenial_linux: ignored (out of standard support)
35bionic_linux: released (4.15.0-197.208)36bionic_linux: released (4.15.0-197.208)
@@ -112,11 +113,11 @@ bionic_linux-lts-xenial: DNE
112focal_linux-lts-xenial: DNE113focal_linux-lts-xenial: DNE
113jammy_linux-lts-xenial: DNE114jammy_linux-lts-xenial: DNE
114kinetic_linux-lts-xenial: DNE115kinetic_linux-lts-xenial: DNE
115trusty/esm_linux-lts-xenial: pending116trusty/esm_linux-lts-xenial: released (4.4.0-237.271~14.04.1)
116117
117Patches_linux-kvm:118Patches_linux-kvm:
118upstream_linux-kvm: released (5.19)119upstream_linux-kvm: released (5.19)
119esm-infra/xenial_linux-kvm: pending120esm-infra/xenial_linux-kvm: released (4.4.0-1117.127)
120trusty_linux-kvm: DNE121trusty_linux-kvm: DNE
121xenial_linux-kvm: ignored (end of standard support)122xenial_linux-kvm: ignored (end of standard support)
122bionic_linux-kvm: released (4.15.0-1129.134)123bionic_linux-kvm: released (4.15.0-1129.134)
@@ -134,7 +135,7 @@ bionic_linux-aws: released (4.15.0-1143.155)
134focal_linux-aws: released (5.4.0-1086.93)135focal_linux-aws: released (5.4.0-1086.93)
135jammy_linux-aws: released (5.15.0-1021.25)136jammy_linux-aws: released (5.15.0-1021.25)
136kinetic_linux-aws: not-affected (5.19.0-1005.5)137kinetic_linux-aws: not-affected (5.19.0-1005.5)
137trusty/esm_linux-aws: pending138trusty/esm_linux-aws: released (4.4.0-1116.122)
138devel_linux-aws: not-affected (5.19.0-1009.9)139devel_linux-aws: not-affected (5.19.0-1009.9)
139140
140Patches_linux-aws-5.0:141Patches_linux-aws-5.0:
diff --git a/active/CVE-2022-3424 b/active/CVE-2022-3424
index ea31238..1bb5db9 100644
--- a/active/CVE-2022-3424
+++ b/active/CVE-2022-3424
@@ -8,6 +8,7 @@ References:
8 https://ubuntu.com/security/notices/USN-5856-18 https://ubuntu.com/security/notices/USN-5856-1
9 https://ubuntu.com/security/notices/USN-5917-19 https://ubuntu.com/security/notices/USN-5917-1
10 https://ubuntu.com/security/notices/USN-5924-110 https://ubuntu.com/security/notices/USN-5924-1
11 https://ubuntu.com/security/notices/USN-5927-1
11Description:12Description:
12 [misc: sgi-gru: fix use-after-free error in gru_set_context_option,13 [misc: sgi-gru: fix use-after-free error in gru_set_context_option,
13 gru_fault and gru_handle_user_call_os]14 gru_fault and gru_handle_user_call_os]
@@ -211,7 +212,7 @@ Patches_linux-azure-4.15:
211upstream_linux-azure-4.15: needs-triage212upstream_linux-azure-4.15: needs-triage
212trusty_linux-azure-4.15: DNE213trusty_linux-azure-4.15: DNE
213xenial_linux-azure-4.15: DNE214xenial_linux-azure-4.15: DNE
214bionic_linux-azure-4.15: needs-triage215bionic_linux-azure-4.15: released (4.15.0-1162.177)
215focal_linux-azure-4.15: DNE216focal_linux-azure-4.15: DNE
216jammy_linux-azure-4.15: DNE217jammy_linux-azure-4.15: DNE
217218
diff --git a/active/CVE-2022-3521 b/active/CVE-2022-3521
index 2791905..05e5e37 100644
--- a/active/CVE-2022-3521
+++ b/active/CVE-2022-3521
@@ -11,6 +11,8 @@ References:
11 https://ubuntu.com/security/notices/USN-5919-111 https://ubuntu.com/security/notices/USN-5919-1
12 https://ubuntu.com/security/notices/USN-5920-112 https://ubuntu.com/security/notices/USN-5920-1
13 https://ubuntu.com/security/notices/USN-5924-113 https://ubuntu.com/security/notices/USN-5924-1
14 https://ubuntu.com/security/notices/USN-5925-1
15 https://ubuntu.com/security/notices/USN-5927-1
14Description:16Description:
15 A vulnerability has been found in Linux Kernel and classified as17 A vulnerability has been found in Linux Kernel and classified as
16 problematic. This vulnerability affects the function kcm_tx_work of the18 problematic. This vulnerability affects the function kcm_tx_work of the
@@ -132,7 +134,7 @@ upstream_linux-kvm: needs-triage
132esm-infra/xenial_linux-kvm: needs-triage134esm-infra/xenial_linux-kvm: needs-triage
133trusty_linux-kvm: DNE135trusty_linux-kvm: DNE
134xenial_linux-kvm: ignored (end of standard support)136xenial_linux-kvm: ignored (end of standard support)
135bionic_linux-kvm: needs-triage137bionic_linux-kvm: released (4.15.0-1136.141)
136focal_linux-kvm: released (5.4.0-1087.93)138focal_linux-kvm: released (5.4.0-1087.93)
137jammy_linux-kvm: needs-triage139jammy_linux-kvm: needs-triage
138kinetic_linux-kvm: needs-triage140kinetic_linux-kvm: needs-triage
@@ -247,7 +249,7 @@ Patches_linux-azure-4.15:
247upstream_linux-azure-4.15: needs-triage249upstream_linux-azure-4.15: needs-triage
248trusty_linux-azure-4.15: DNE250trusty_linux-azure-4.15: DNE
249xenial_linux-azure-4.15: DNE251xenial_linux-azure-4.15: DNE
250bionic_linux-azure-4.15: needs-triage252bionic_linux-azure-4.15: released (4.15.0-1162.177)
251focal_linux-azure-4.15: DNE253focal_linux-azure-4.15: DNE
252jammy_linux-azure-4.15: DNE254jammy_linux-azure-4.15: DNE
253kinetic_linux-azure-4.15: DNE255kinetic_linux-azure-4.15: DNE
@@ -776,7 +778,7 @@ Patches_linux-raspi2:
776upstream_linux-raspi2: needs-triage778upstream_linux-raspi2: needs-triage
777trusty_linux-raspi2: DNE779trusty_linux-raspi2: DNE
778xenial_linux-raspi2: ignored (end of standard support)780xenial_linux-raspi2: ignored (end of standard support)
779bionic_linux-raspi2: needs-triage781bionic_linux-raspi2: released (4.15.0-1128.136)
780esm-apps/bionic_linux-raspi2: needs-triage782esm-apps/bionic_linux-raspi2: needs-triage
781focal_linux-raspi2: ignored (replaced by linux-raspi)783focal_linux-raspi2: ignored (replaced by linux-raspi)
782jammy_linux-raspi2: DNE784jammy_linux-raspi2: DNE
@@ -838,7 +840,7 @@ Patches_linux-snapdragon:
838upstream_linux-snapdragon: needs-triage840upstream_linux-snapdragon: needs-triage
839trusty_linux-snapdragon: DNE841trusty_linux-snapdragon: DNE
840xenial_linux-snapdragon: ignored (end of standard support)842xenial_linux-snapdragon: ignored (end of standard support)
841bionic_linux-snapdragon: needs-triage843bionic_linux-snapdragon: released (4.15.0-1146.156)
842focal_linux-snapdragon: DNE844focal_linux-snapdragon: DNE
843jammy_linux-snapdragon: DNE845jammy_linux-snapdragon: DNE
844kinetic_linux-snapdragon: DNE846kinetic_linux-snapdragon: DNE
diff --git a/active/CVE-2022-3545 b/active/CVE-2022-3545
index 27e663c..c88389c 100644
--- a/active/CVE-2022-3545
+++ b/active/CVE-2022-3545
@@ -13,6 +13,8 @@ References:
13 https://ubuntu.com/security/notices/USN-5919-113 https://ubuntu.com/security/notices/USN-5919-1
14 https://ubuntu.com/security/notices/USN-5920-114 https://ubuntu.com/security/notices/USN-5920-1
15 https://ubuntu.com/security/notices/USN-5924-115 https://ubuntu.com/security/notices/USN-5924-1
16 https://ubuntu.com/security/notices/USN-5925-1
17 https://ubuntu.com/security/notices/USN-5927-1
16Description:18Description:
17 A vulnerability has been found in Linux Kernel and classified as critical.19 A vulnerability has been found in Linux Kernel and classified as critical.
18 Affected by this vulnerability is the function area_cache_get of the file20 Affected by this vulnerability is the function area_cache_get of the file
@@ -135,7 +137,7 @@ upstream_linux-kvm: released (6.0~rc1)
135esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9)137esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9)
136trusty_linux-kvm: DNE138trusty_linux-kvm: DNE
137xenial_linux-kvm: ignored (end of standard support)139xenial_linux-kvm: ignored (end of standard support)
138bionic_linux-kvm: pending (4.15.0-1136.141)140bionic_linux-kvm: released (4.15.0-1136.141)
139focal_linux-kvm: released (5.4.0-1087.93)141focal_linux-kvm: released (5.4.0-1087.93)
140jammy_linux-kvm: pending (5.15.0-1029.34)142jammy_linux-kvm: pending (5.15.0-1029.34)
141kinetic_linux-kvm: pending (5.19.0-1019.20)143kinetic_linux-kvm: pending (5.19.0-1019.20)
@@ -250,7 +252,7 @@ Patches_linux-azure-4.15:
250upstream_linux-azure-4.15: released (6.0~rc1)252upstream_linux-azure-4.15: released (6.0~rc1)
251trusty_linux-azure-4.15: DNE253trusty_linux-azure-4.15: DNE
252xenial_linux-azure-4.15: DNE254xenial_linux-azure-4.15: DNE
253bionic_linux-azure-4.15: needed255bionic_linux-azure-4.15: released (4.15.0-1162.177)
254focal_linux-azure-4.15: DNE256focal_linux-azure-4.15: DNE
255jammy_linux-azure-4.15: DNE257jammy_linux-azure-4.15: DNE
256kinetic_linux-azure-4.15: DNE258kinetic_linux-azure-4.15: DNE
@@ -779,7 +781,7 @@ Patches_linux-raspi2:
779upstream_linux-raspi2: released (6.0~rc1)781upstream_linux-raspi2: released (6.0~rc1)
780trusty_linux-raspi2: DNE782trusty_linux-raspi2: DNE
781xenial_linux-raspi2: ignored (end of standard support)783xenial_linux-raspi2: ignored (end of standard support)
782bionic_linux-raspi2: pending (4.15.0-1128.136)784bionic_linux-raspi2: released (4.15.0-1128.136)
783esm-apps/bionic_linux-raspi2: needed785esm-apps/bionic_linux-raspi2: needed
784focal_linux-raspi2: ignored (replaced by linux-raspi)786focal_linux-raspi2: ignored (replaced by linux-raspi)
785jammy_linux-raspi2: DNE787jammy_linux-raspi2: DNE
@@ -841,7 +843,7 @@ Patches_linux-snapdragon:
841upstream_linux-snapdragon: released (6.0~rc1)843upstream_linux-snapdragon: released (6.0~rc1)
842trusty_linux-snapdragon: DNE844trusty_linux-snapdragon: DNE
843xenial_linux-snapdragon: ignored (end of standard support)845xenial_linux-snapdragon: ignored (end of standard support)
844bionic_linux-snapdragon: pending (4.15.0-1146.156)846bionic_linux-snapdragon: released (4.15.0-1146.156)
845focal_linux-snapdragon: DNE847focal_linux-snapdragon: DNE
846jammy_linux-snapdragon: DNE848jammy_linux-snapdragon: DNE
847kinetic_linux-snapdragon: DNE849kinetic_linux-snapdragon: DNE
diff --git a/active/CVE-2022-3628 b/active/CVE-2022-3628
index 58f8389..b7d9fda 100644
--- a/active/CVE-2022-3628
+++ b/active/CVE-2022-3628
@@ -22,6 +22,8 @@ References:
22 https://ubuntu.com/security/notices/USN-5919-122 https://ubuntu.com/security/notices/USN-5919-1
23 https://ubuntu.com/security/notices/USN-5920-123 https://ubuntu.com/security/notices/USN-5920-1
24 https://ubuntu.com/security/notices/USN-5924-124 https://ubuntu.com/security/notices/USN-5924-1
25 https://ubuntu.com/security/notices/USN-5925-1
26 https://ubuntu.com/security/notices/USN-5927-1
25Description:27Description:
26 A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC28 A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC
27 Wi-Fi driver. This issue occurs when a user connects to a malicious USB29 Wi-Fi driver. This issue occurs when a user connects to a malicious USB
@@ -135,7 +137,7 @@ upstream_linux-kvm: released (6.1~rc5)
135esm-infra/xenial_linux-kvm: ignored (was needed ESM criteria)137esm-infra/xenial_linux-kvm: ignored (was needed ESM criteria)
136trusty_linux-kvm: DNE138trusty_linux-kvm: DNE
137xenial_linux-kvm: ignored (end of standard support)139xenial_linux-kvm: ignored (end of standard support)
138bionic_linux-kvm: needed140bionic_linux-kvm: released (4.15.0-1136.141)
139focal_linux-kvm: released (5.4.0-1086.92)141focal_linux-kvm: released (5.4.0-1086.92)
140jammy_linux-kvm: released (5.15.0-1028.33)142jammy_linux-kvm: released (5.15.0-1028.33)
141kinetic_linux-kvm: released (5.19.0-1018.19)143kinetic_linux-kvm: released (5.19.0-1018.19)
@@ -242,7 +244,7 @@ Patches_linux-azure-4.15:
242upstream_linux-azure-4.15: released (6.1~rc5)244upstream_linux-azure-4.15: released (6.1~rc5)
243trusty_linux-azure-4.15: DNE245trusty_linux-azure-4.15: DNE
244xenial_linux-azure-4.15: DNE246xenial_linux-azure-4.15: DNE
245bionic_linux-azure-4.15: needed247bionic_linux-azure-4.15: released (4.15.0-1162.177)
246focal_linux-azure-4.15: DNE248focal_linux-azure-4.15: DNE
247jammy_linux-azure-4.15: DNE249jammy_linux-azure-4.15: DNE
248kinetic_linux-azure-4.15: DNE250kinetic_linux-azure-4.15: DNE
@@ -725,7 +727,7 @@ Patches_linux-raspi2:
725upstream_linux-raspi2: released (6.1~rc5)727upstream_linux-raspi2: released (6.1~rc5)
726trusty_linux-raspi2: DNE728trusty_linux-raspi2: DNE
727xenial_linux-raspi2: ignored (end of standard support)729xenial_linux-raspi2: ignored (end of standard support)
728bionic_linux-raspi2: needed730bionic_linux-raspi2: released (4.15.0-1128.136)
729esm-apps/bionic_linux-raspi2: needs-triage731esm-apps/bionic_linux-raspi2: needs-triage
730focal_linux-raspi2: ignored (replaced by linux-raspi)732focal_linux-raspi2: ignored (replaced by linux-raspi)
731jammy_linux-raspi2: DNE733jammy_linux-raspi2: DNE
@@ -782,7 +784,7 @@ Patches_linux-snapdragon:
782upstream_linux-snapdragon: released (6.1~rc5)784upstream_linux-snapdragon: released (6.1~rc5)
783trusty_linux-snapdragon: DNE785trusty_linux-snapdragon: DNE
784xenial_linux-snapdragon: ignored (end of standard support)786xenial_linux-snapdragon: ignored (end of standard support)
785bionic_linux-snapdragon: needed787bionic_linux-snapdragon: released (4.15.0-1146.156)
786focal_linux-snapdragon: DNE788focal_linux-snapdragon: DNE
787jammy_linux-snapdragon: DNE789jammy_linux-snapdragon: DNE
788kinetic_linux-snapdragon: DNE790kinetic_linux-snapdragon: DNE
diff --git a/active/CVE-2022-36280 b/active/CVE-2022-36280
index 6485f01..f5d54e7 100644
--- a/active/CVE-2022-36280
+++ b/active/CVE-2022-36280
@@ -6,6 +6,7 @@ References:
6 https://ubuntu.com/security/notices/USN-5915-16 https://ubuntu.com/security/notices/USN-5915-1
7 https://ubuntu.com/security/notices/USN-5917-17 https://ubuntu.com/security/notices/USN-5917-1
8 https://ubuntu.com/security/notices/USN-5924-18 https://ubuntu.com/security/notices/USN-5924-1
9 https://ubuntu.com/security/notices/USN-5927-1
9Description:10Description:
10 An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx11 An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx
11 driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux12 driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux
@@ -133,7 +134,7 @@ Patches_linux-azure-4.15:
133upstream_linux-azure-4.15: needs-triage134upstream_linux-azure-4.15: needs-triage
134trusty_linux-azure-4.15: ignored (out of standard support)135trusty_linux-azure-4.15: ignored (out of standard support)
135xenial_linux-azure-4.15: ignored (out of standard support)136xenial_linux-azure-4.15: ignored (out of standard support)
136bionic_linux-azure-4.15: needs-triage137bionic_linux-azure-4.15: released (4.15.0-1162.177)
137focal_linux-azure-4.15: DNE138focal_linux-azure-4.15: DNE
138jammy_linux-azure-4.15: DNE139jammy_linux-azure-4.15: DNE
139140
diff --git a/active/CVE-2022-3640 b/active/CVE-2022-3640
index 30375e2..35a1f63 100644
--- a/active/CVE-2022-3640
+++ b/active/CVE-2022-3640
@@ -21,6 +21,8 @@ References:
21 https://ubuntu.com/security/notices/USN-5919-121 https://ubuntu.com/security/notices/USN-5919-1
22 https://ubuntu.com/security/notices/USN-5920-122 https://ubuntu.com/security/notices/USN-5920-1
23 https://ubuntu.com/security/notices/USN-5924-123 https://ubuntu.com/security/notices/USN-5924-1
24 https://ubuntu.com/security/notices/USN-5925-1
25 https://ubuntu.com/security/notices/USN-5927-1
24Description:26Description:
25 A vulnerability, which was classified as critical, was found in Linux27 A vulnerability, which was classified as critical, was found in Linux
26 Kernel. Affected is the function l2cap_conn_del of the file28 Kernel. Affected is the function l2cap_conn_del of the file
@@ -128,7 +130,7 @@ upstream_linux-kvm: needed
128esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9)130esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9)
129trusty_linux-kvm: DNE131trusty_linux-kvm: DNE
130xenial_linux-kvm: ignored (end of standard support)132xenial_linux-kvm: ignored (end of standard support)
131bionic_linux-kvm: needed133bionic_linux-kvm: released (4.15.0-1136.141)
132focal_linux-kvm: released (5.4.0-1086.92)134focal_linux-kvm: released (5.4.0-1086.92)
133jammy_linux-kvm: released (5.15.0-1028.33)135jammy_linux-kvm: released (5.15.0-1028.33)
134kinetic_linux-kvm: released (5.19.0-1018.19)136kinetic_linux-kvm: released (5.19.0-1018.19)
@@ -227,7 +229,7 @@ Patches_linux-azure-4.15:
227upstream_linux-azure-4.15: needed229upstream_linux-azure-4.15: needed
228trusty_linux-azure-4.15: DNE230trusty_linux-azure-4.15: DNE
229xenial_linux-azure-4.15: DNE231xenial_linux-azure-4.15: DNE
230bionic_linux-azure-4.15: needed232bionic_linux-azure-4.15: released (4.15.0-1162.177)
231focal_linux-azure-4.15: DNE233focal_linux-azure-4.15: DNE
232jammy_linux-azure-4.15: DNE234jammy_linux-azure-4.15: DNE
233235
@@ -656,7 +658,7 @@ Patches_linux-raspi2:
656upstream_linux-raspi2: needed658upstream_linux-raspi2: needed
657trusty_linux-raspi2: DNE659trusty_linux-raspi2: DNE
658xenial_linux-raspi2: ignored (end of standard support)660xenial_linux-raspi2: ignored (end of standard support)
659bionic_linux-raspi2: needed661bionic_linux-raspi2: released (4.15.0-1128.136)
660esm-apps/bionic_linux-raspi2: needed662esm-apps/bionic_linux-raspi2: needed
661focal_linux-raspi2: ignored (replaced by linux-raspi)663focal_linux-raspi2: ignored (replaced by linux-raspi)
662jammy_linux-raspi2: DNE664jammy_linux-raspi2: DNE
@@ -708,7 +710,7 @@ Patches_linux-snapdragon:
708upstream_linux-snapdragon: needed710upstream_linux-snapdragon: needed
709trusty_linux-snapdragon: DNE711trusty_linux-snapdragon: DNE
710xenial_linux-snapdragon: ignored (end of standard support)712xenial_linux-snapdragon: ignored (end of standard support)
711bionic_linux-snapdragon: needed713bionic_linux-snapdragon: released (4.15.0-1146.156)
712focal_linux-snapdragon: DNE714focal_linux-snapdragon: DNE
713jammy_linux-snapdragon: DNE715jammy_linux-snapdragon: DNE
714716
diff --git a/active/CVE-2022-41218 b/active/CVE-2022-41218
index e0c106e..b9dc071 100644
--- a/active/CVE-2022-41218
+++ b/active/CVE-2022-41218
@@ -13,6 +13,7 @@ References:
13 https://ubuntu.com/security/notices/USN-5915-113 https://ubuntu.com/security/notices/USN-5915-1
14 https://ubuntu.com/security/notices/USN-5917-114 https://ubuntu.com/security/notices/USN-5917-1
15 https://ubuntu.com/security/notices/USN-5924-115 https://ubuntu.com/security/notices/USN-5924-1
16 https://ubuntu.com/security/notices/USN-5927-1
16Description:17Description:
17 In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10,18 In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10,
18 there is a use-after-free caused by refcount races, affecting19 there is a use-after-free caused by refcount races, affecting
@@ -215,7 +216,7 @@ Patches_linux-azure-4.15:
215upstream_linux-azure-4.15: needs-triage216upstream_linux-azure-4.15: needs-triage
216trusty_linux-azure-4.15: DNE217trusty_linux-azure-4.15: DNE
217xenial_linux-azure-4.15: DNE218xenial_linux-azure-4.15: DNE
218bionic_linux-azure-4.15: needs-triage219bionic_linux-azure-4.15: released (4.15.0-1162.177)
219focal_linux-azure-4.15: DNE220focal_linux-azure-4.15: DNE
220jammy_linux-azure-4.15: DNE221jammy_linux-azure-4.15: DNE
221222
diff --git a/active/CVE-2022-41858 b/active/CVE-2022-41858
index de076ee..e5f48cb 100644
--- a/active/CVE-2022-41858
+++ b/active/CVE-2022-41858
@@ -6,6 +6,7 @@ References:
6 https://git.kernel.org/linus/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798 (5.18-rc2)6 https://git.kernel.org/linus/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798 (5.18-rc2)
7 https://access.redhat.com/security/cve/CVE-2022-418587 https://access.redhat.com/security/cve/CVE-2022-41858
8 https://ubuntu.com/security/notices/USN-5884-18 https://ubuntu.com/security/notices/USN-5884-1
9 https://ubuntu.com/security/notices/USN-5926-1
9Description:10Description:
10 A flaw was found in the Linux kernel. A NULL pointer dereference may occur11 A flaw was found in the Linux kernel. A NULL pointer dereference may occur
11 while a slip driver is in progress to detach in sl_tx_timeout in12 while a slip driver is in progress to detach in sl_tx_timeout in
@@ -27,7 +28,7 @@ CVSS:
27Patches_linux:28Patches_linux:
28 break-fix: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 ec4eb8a86ade4d22633e1da2a7d85a846b7d179829 break-fix: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 ec4eb8a86ade4d22633e1da2a7d85a846b7d1798
29upstream_linux: released (5.18~rc2)30upstream_linux: released (5.18~rc2)
30esm-infra/xenial_linux: pending31esm-infra/xenial_linux: released (4.4.0-237.271)
31trusty_linux: ignored (out of standard support)32trusty_linux: ignored (out of standard support)
32xenial_linux: ignored (out of standard support)33xenial_linux: ignored (out of standard support)
33bionic_linux: released (4.15.0-189.200)34bionic_linux: released (4.15.0-189.200)
@@ -110,11 +111,11 @@ bionic_linux-lts-xenial: DNE
110focal_linux-lts-xenial: DNE111focal_linux-lts-xenial: DNE
111jammy_linux-lts-xenial: DNE112jammy_linux-lts-xenial: DNE
112kinetic_linux-lts-xenial: DNE113kinetic_linux-lts-xenial: DNE
113trusty/esm_linux-lts-xenial: pending114trusty/esm_linux-lts-xenial: released (4.4.0-237.271~14.04.1)
114115
115Patches_linux-kvm:116Patches_linux-kvm:
116upstream_linux-kvm: released (5.18~rc2)117upstream_linux-kvm: released (5.18~rc2)
117esm-infra/xenial_linux-kvm: pending118esm-infra/xenial_linux-kvm: released (4.4.0-1117.127)
118trusty_linux-kvm: DNE119trusty_linux-kvm: DNE
119xenial_linux-kvm: ignored (end of standard support)120xenial_linux-kvm: ignored (end of standard support)
120bionic_linux-kvm: released (4.15.0-1123.128)121bionic_linux-kvm: released (4.15.0-1123.128)
@@ -132,7 +133,7 @@ bionic_linux-aws: released (4.15.0-1137.148)
132focal_linux-aws: released (5.4.0-1081.88)133focal_linux-aws: released (5.4.0-1081.88)
133jammy_linux-aws: released (5.15.0-1009.11)134jammy_linux-aws: released (5.15.0-1009.11)
134kinetic_linux-aws: not-affected (5.19.0-1005.5)135kinetic_linux-aws: not-affected (5.19.0-1005.5)
135trusty/esm_linux-aws: pending136trusty/esm_linux-aws: released (4.4.0-1116.122)
136devel_linux-aws: not-affected (5.19.0-1009.9)137devel_linux-aws: not-affected (5.19.0-1009.9)
137138
138Patches_linux-aws-5.0:139Patches_linux-aws-5.0:
diff --git a/active/CVE-2022-42328 b/active/CVE-2022-42328
index db4ffc3..ce43ece 100644
--- a/active/CVE-2022-42328
+++ b/active/CVE-2022-42328
@@ -12,6 +12,8 @@ References:
12 https://ubuntu.com/security/notices/USN-5919-112 https://ubuntu.com/security/notices/USN-5919-1
13 https://ubuntu.com/security/notices/USN-5920-113 https://ubuntu.com/security/notices/USN-5920-1
14 https://ubuntu.com/security/notices/USN-5924-114 https://ubuntu.com/security/notices/USN-5924-1
15 https://ubuntu.com/security/notices/USN-5925-1
16 https://ubuntu.com/security/notices/USN-5927-1
15Description:17Description:
16 Guests can trigger deadlock in Linux netback driver T[his CNA information18 Guests can trigger deadlock in Linux netback driver T[his CNA information
17 record relates to multiple CVEs; the text explains which19 record relates to multiple CVEs; the text explains which
@@ -128,7 +130,7 @@ upstream_linux-kvm: released (6.1)
128esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9)130esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9)
129trusty_linux-kvm: DNE131trusty_linux-kvm: DNE
130xenial_linux-kvm: ignored (end of standard support)132xenial_linux-kvm: ignored (end of standard support)
131bionic_linux-kvm: pending (4.15.0-1136.141)133bionic_linux-kvm: released (4.15.0-1136.141)
132focal_linux-kvm: released (5.4.0-1087.93)134focal_linux-kvm: released (5.4.0-1087.93)
133jammy_linux-kvm: pending (5.15.0-1029.34)135jammy_linux-kvm: pending (5.15.0-1029.34)
134kinetic_linux-kvm: needed136kinetic_linux-kvm: needed
@@ -235,7 +237,7 @@ Patches_linux-azure-4.15:
235upstream_linux-azure-4.15: released (6.1)237upstream_linux-azure-4.15: released (6.1)
236trusty_linux-azure-4.15: DNE238trusty_linux-azure-4.15: DNE
237xenial_linux-azure-4.15: DNE239xenial_linux-azure-4.15: DNE
238bionic_linux-azure-4.15: needed240bionic_linux-azure-4.15: released (4.15.0-1162.177)
239focal_linux-azure-4.15: DNE241focal_linux-azure-4.15: DNE
240jammy_linux-azure-4.15: DNE242jammy_linux-azure-4.15: DNE
241kinetic_linux-azure-4.15: DNE243kinetic_linux-azure-4.15: DNE
@@ -718,7 +720,7 @@ Patches_linux-raspi2:
718upstream_linux-raspi2: released (6.1)720upstream_linux-raspi2: released (6.1)
719trusty_linux-raspi2: DNE721trusty_linux-raspi2: DNE
720xenial_linux-raspi2: ignored (end of standard support)722xenial_linux-raspi2: ignored (end of standard support)
721bionic_linux-raspi2: pending (4.15.0-1128.136)723bionic_linux-raspi2: released (4.15.0-1128.136)
722esm-apps/bionic_linux-raspi2: needs-triage724esm-apps/bionic_linux-raspi2: needs-triage
723focal_linux-raspi2: ignored (replaced by linux-raspi)725focal_linux-raspi2: ignored (replaced by linux-raspi)
724jammy_linux-raspi2: DNE726jammy_linux-raspi2: DNE
@@ -775,7 +777,7 @@ Patches_linux-snapdragon:
775upstream_linux-snapdragon: released (6.1)777upstream_linux-snapdragon: released (6.1)
776trusty_linux-snapdragon: DNE778trusty_linux-snapdragon: DNE
777xenial_linux-snapdragon: ignored (end of standard support)779xenial_linux-snapdragon: ignored (end of standard support)
778bionic_linux-snapdragon: pending (4.15.0-1146.156)780bionic_linux-snapdragon: released (4.15.0-1146.156)
779focal_linux-snapdragon: DNE781focal_linux-snapdragon: DNE
780jammy_linux-snapdragon: DNE782jammy_linux-snapdragon: DNE
781kinetic_linux-snapdragon: DNE783kinetic_linux-snapdragon: DNE
diff --git a/active/CVE-2022-42329 b/active/CVE-2022-42329
index 3a0b3f1..e41cfdf 100644
--- a/active/CVE-2022-42329
+++ b/active/CVE-2022-42329
@@ -11,6 +11,8 @@ References:
11 https://ubuntu.com/security/notices/USN-5919-111 https://ubuntu.com/security/notices/USN-5919-1
12 https://ubuntu.com/security/notices/USN-5920-112 https://ubuntu.com/security/notices/USN-5920-1
13 https://ubuntu.com/security/notices/USN-5924-113 https://ubuntu.com/security/notices/USN-5924-1
14 https://ubuntu.com/security/notices/USN-5925-1
15 https://ubuntu.com/security/notices/USN-5927-1
14Description:16Description:
15 Guests can trigger deadlock in Linux netback driver T[his CNA information17 Guests can trigger deadlock in Linux netback driver T[his CNA information
16 record relates to multiple CVEs; the text explains which18 record relates to multiple CVEs; the text explains which
@@ -127,7 +129,7 @@ upstream_linux-kvm: released (6.1)
127esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9)129esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9)
128trusty_linux-kvm: DNE130trusty_linux-kvm: DNE
129xenial_linux-kvm: ignored (end of standard support)131xenial_linux-kvm: ignored (end of standard support)
130bionic_linux-kvm: pending (4.15.0-1136.141)132bionic_linux-kvm: released (4.15.0-1136.141)
131focal_linux-kvm: released (5.4.0-1087.93)133focal_linux-kvm: released (5.4.0-1087.93)
132jammy_linux-kvm: pending (5.15.0-1029.34)134jammy_linux-kvm: pending (5.15.0-1029.34)
133kinetic_linux-kvm: needed135kinetic_linux-kvm: needed
@@ -234,7 +236,7 @@ Patches_linux-azure-4.15:
234upstream_linux-azure-4.15: released (6.1)236upstream_linux-azure-4.15: released (6.1)
235trusty_linux-azure-4.15: DNE237trusty_linux-azure-4.15: DNE
236xenial_linux-azure-4.15: DNE238xenial_linux-azure-4.15: DNE
237bionic_linux-azure-4.15: pending (4.15.0-1162.177)239bionic_linux-azure-4.15: released (4.15.0-1162.177)
238focal_linux-azure-4.15: DNE240focal_linux-azure-4.15: DNE
239jammy_linux-azure-4.15: DNE241jammy_linux-azure-4.15: DNE
240kinetic_linux-azure-4.15: DNE242kinetic_linux-azure-4.15: DNE
@@ -717,7 +719,7 @@ Patches_linux-raspi2:
717upstream_linux-raspi2: released (6.1)719upstream_linux-raspi2: released (6.1)
718trusty_linux-raspi2: DNE720trusty_linux-raspi2: DNE
719xenial_linux-raspi2: ignored (end of standard support)721xenial_linux-raspi2: ignored (end of standard support)
720bionic_linux-raspi2: pending (4.15.0-1128.136)722bionic_linux-raspi2: released (4.15.0-1128.136)
721esm-apps/bionic_linux-raspi2: needs-triage723esm-apps/bionic_linux-raspi2: needs-triage
722focal_linux-raspi2: ignored (replaced by linux-raspi)724focal_linux-raspi2: ignored (replaced by linux-raspi)
723jammy_linux-raspi2: DNE725jammy_linux-raspi2: DNE
@@ -774,7 +776,7 @@ Patches_linux-snapdragon:
774upstream_linux-snapdragon: released (6.1)776upstream_linux-snapdragon: released (6.1)
775trusty_linux-snapdragon: DNE777trusty_linux-snapdragon: DNE
776xenial_linux-snapdragon: ignored (end of standard support)778xenial_linux-snapdragon: ignored (end of standard support)
777bionic_linux-snapdragon: pending (4.15.0-1146.156)779bionic_linux-snapdragon: released (4.15.0-1146.156)
778focal_linux-snapdragon: DNE780focal_linux-snapdragon: DNE
779jammy_linux-snapdragon: DNE781jammy_linux-snapdragon: DNE
780kinetic_linux-snapdragon: DNE782kinetic_linux-snapdragon: DNE
diff --git a/active/CVE-2022-42895 b/active/CVE-2022-42895
index 815ce98..6252f94 100644
--- a/active/CVE-2022-42895
+++ b/active/CVE-2022-42895
@@ -25,6 +25,9 @@ References:
25 https://ubuntu.com/security/notices/USN-5919-125 https://ubuntu.com/security/notices/USN-5919-1
26 https://ubuntu.com/security/notices/USN-5920-126 https://ubuntu.com/security/notices/USN-5920-1
27 https://ubuntu.com/security/notices/USN-5924-127 https://ubuntu.com/security/notices/USN-5924-1
28 https://ubuntu.com/security/notices/USN-5925-1
29 https://ubuntu.com/security/notices/USN-5926-1
30 https://ubuntu.com/security/notices/USN-5927-1
28Description:31Description:
29 There is an infoleak vulnerability in the Linux kernel's32 There is an infoleak vulnerability in the Linux kernel's
30 net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be33 net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be
@@ -48,7 +51,7 @@ CVSS:
48Patches_linux:51Patches_linux:
49 break-fix: 42dceae2819b5ac6fc9a0d414ae05a8960e2a1d9 b1a2cd50c0357f243b7435a732b4e62ba3157a2e52 break-fix: 42dceae2819b5ac6fc9a0d414ae05a8960e2a1d9 b1a2cd50c0357f243b7435a732b4e62ba3157a2e
50upstream_linux: released (6.1~rc4)53upstream_linux: released (6.1~rc4)
51esm-infra/xenial_linux: pending54esm-infra/xenial_linux: released (4.4.0-237.271)
52trusty_linux: ignored (out of standard support)55trusty_linux: ignored (out of standard support)
53xenial_linux: ignored (out of standard support)56xenial_linux: ignored (out of standard support)
54bionic_linux: released (4.15.0-206.217)57bionic_linux: released (4.15.0-206.217)
@@ -131,14 +134,14 @@ bionic_linux-lts-xenial: DNE
131focal_linux-lts-xenial: DNE134focal_linux-lts-xenial: DNE
132jammy_linux-lts-xenial: DNE135jammy_linux-lts-xenial: DNE
133kinetic_linux-lts-xenial: DNE136kinetic_linux-lts-xenial: DNE
134trusty/esm_linux-lts-xenial: pending137trusty/esm_linux-lts-xenial: released (4.4.0-237.271~14.04.1)
135138
136Patches_linux-kvm:139Patches_linux-kvm:
137upstream_linux-kvm: released (6.1~rc4)140upstream_linux-kvm: released (6.1~rc4)
138esm-infra/xenial_linux-kvm: pending141esm-infra/xenial_linux-kvm: released (4.4.0-1117.127)
139trusty_linux-kvm: DNE142trusty_linux-kvm: DNE
140xenial_linux-kvm: ignored (end of standard support)143xenial_linux-kvm: ignored (end of standard support)
141bionic_linux-kvm: pending (4.15.0-1136.141)144bionic_linux-kvm: released (4.15.0-1136.141)
142focal_linux-kvm: released (5.4.0-1086.92)145focal_linux-kvm: released (5.4.0-1086.92)
143jammy_linux-kvm: released (5.15.0-1028.33)146jammy_linux-kvm: released (5.15.0-1028.33)
144kinetic_linux-kvm: released (5.19.0-1018.19)147kinetic_linux-kvm: released (5.19.0-1018.19)
@@ -153,7 +156,7 @@ bionic_linux-aws: released (4.15.0-1151.164)
153focal_linux-aws: released (5.4.0-1096.104)156focal_linux-aws: released (5.4.0-1096.104)
154jammy_linux-aws: released (5.15.0-1030.34)157jammy_linux-aws: released (5.15.0-1030.34)
155kinetic_linux-aws: released (5.19.0-1019.20)158kinetic_linux-aws: released (5.19.0-1019.20)
156trusty/esm_linux-aws: pending159trusty/esm_linux-aws: released (4.4.0-1116.122)
157devel_linux-aws: pending160devel_linux-aws: pending
158161
159Patches_linux-aws-5.0:162Patches_linux-aws-5.0:
@@ -245,7 +248,7 @@ Patches_linux-azure-4.15:
245upstream_linux-azure-4.15: released (6.1~rc4)248upstream_linux-azure-4.15: released (6.1~rc4)
246trusty_linux-azure-4.15: DNE249trusty_linux-azure-4.15: DNE
247xenial_linux-azure-4.15: DNE250xenial_linux-azure-4.15: DNE
248bionic_linux-azure-4.15: pending (4.15.0-1162.177)251bionic_linux-azure-4.15: released (4.15.0-1162.177)
249focal_linux-azure-4.15: DNE252focal_linux-azure-4.15: DNE
250jammy_linux-azure-4.15: DNE253jammy_linux-azure-4.15: DNE
251kinetic_linux-azure-4.15: DNE254kinetic_linux-azure-4.15: DNE
@@ -728,7 +731,7 @@ Patches_linux-raspi2:
728upstream_linux-raspi2: released (6.1~rc4)731upstream_linux-raspi2: released (6.1~rc4)
729trusty_linux-raspi2: DNE732trusty_linux-raspi2: DNE
730xenial_linux-raspi2: ignored (end of standard support)733xenial_linux-raspi2: ignored (end of standard support)
731bionic_linux-raspi2: pending (4.15.0-1128.136)734bionic_linux-raspi2: released (4.15.0-1128.136)
732esm-apps/bionic_linux-raspi2: needs-triage735esm-apps/bionic_linux-raspi2: needs-triage
733focal_linux-raspi2: ignored (replaced by linux-raspi)736focal_linux-raspi2: ignored (replaced by linux-raspi)
734jammy_linux-raspi2: DNE737jammy_linux-raspi2: DNE
@@ -785,7 +788,7 @@ Patches_linux-snapdragon:
785upstream_linux-snapdragon: released (6.1~rc4)788upstream_linux-snapdragon: released (6.1~rc4)
786trusty_linux-snapdragon: DNE789trusty_linux-snapdragon: DNE
787xenial_linux-snapdragon: ignored (end of standard support)790xenial_linux-snapdragon: ignored (end of standard support)
788bionic_linux-snapdragon: pending (4.15.0-1146.156)791bionic_linux-snapdragon: released (4.15.0-1146.156)
789focal_linux-snapdragon: DNE792focal_linux-snapdragon: DNE
790jammy_linux-snapdragon: DNE793jammy_linux-snapdragon: DNE
791kinetic_linux-snapdragon: DNE794kinetic_linux-snapdragon: DNE
diff --git a/active/CVE-2022-47929 b/active/CVE-2022-47929
index b11e120..8f957e9 100644
--- a/active/CVE-2022-47929
+++ b/active/CVE-2022-47929
@@ -10,6 +10,7 @@ References:
10 https://ubuntu.com/security/notices/USN-5915-110 https://ubuntu.com/security/notices/USN-5915-1
11 https://ubuntu.com/security/notices/USN-5917-111 https://ubuntu.com/security/notices/USN-5917-1
12 https://ubuntu.com/security/notices/USN-5924-112 https://ubuntu.com/security/notices/USN-5924-1
13 https://ubuntu.com/security/notices/USN-5927-1
13Description:14Description:
14 In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the15 In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the
15 traffic control subsystem allows an unprivileged user to trigger a denial16 traffic control subsystem allows an unprivileged user to trigger a denial
@@ -229,7 +230,7 @@ Patches_linux-azure-4.15:
229upstream_linux-azure-4.15: released (6.2~rc4)230upstream_linux-azure-4.15: released (6.2~rc4)
230trusty_linux-azure-4.15: DNE231trusty_linux-azure-4.15: DNE
231xenial_linux-azure-4.15: DNE232xenial_linux-azure-4.15: DNE
232bionic_linux-azure-4.15: pending (4.15.0-1162.177)233bionic_linux-azure-4.15: released (4.15.0-1162.177)
233focal_linux-azure-4.15: DNE234focal_linux-azure-4.15: DNE
234jammy_linux-azure-4.15: DNE235jammy_linux-azure-4.15: DNE
235kinetic_linux-azure-4.15: DNE236kinetic_linux-azure-4.15: DNE
diff --git a/active/CVE-2023-0045 b/active/CVE-2023-0045
index 024671c..10e141f 100644
--- a/active/CVE-2023-0045
+++ b/active/CVE-2023-0045
@@ -13,6 +13,8 @@ References:
13 https://ubuntu.com/security/notices/USN-5915-113 https://ubuntu.com/security/notices/USN-5915-1
14 https://ubuntu.com/security/notices/USN-5917-114 https://ubuntu.com/security/notices/USN-5917-1
15 https://ubuntu.com/security/notices/USN-5924-115 https://ubuntu.com/security/notices/USN-5924-1
16 https://ubuntu.com/security/notices/USN-5926-1
17 https://ubuntu.com/security/notices/USN-5927-1
16Description:18Description:
17Ubuntu-Description:19Ubuntu-Description:
18 José Oliveira and Rodrigo Branco discovered that the prctl syscall20 José Oliveira and Rodrigo Branco discovered that the prctl syscall
@@ -30,7 +32,7 @@ CVSS:
30Patches_linux:32Patches_linux:
31 break-fix: 9137bb27e60e554dab694eafa4cca241fa3a694f a664ec9158eeddd75121d39c9a0758016097fa9633 break-fix: 9137bb27e60e554dab694eafa4cca241fa3a694f a664ec9158eeddd75121d39c9a0758016097fa96
32upstream_linux: released (6.2~rc3)34upstream_linux: released (6.2~rc3)
33esm-infra/xenial_linux: ignored (was needed ESM criteria)35esm-infra/xenial_linux: released (4.4.0-237.271)
34trusty_linux: ignored (out of standard support)36trusty_linux: ignored (out of standard support)
35xenial_linux: ignored (out of standard support)37xenial_linux: ignored (out of standard support)
36bionic_linux: needed38bionic_linux: needed
@@ -113,11 +115,11 @@ bionic_linux-lts-xenial: DNE
113focal_linux-lts-xenial: DNE115focal_linux-lts-xenial: DNE
114jammy_linux-lts-xenial: DNE116jammy_linux-lts-xenial: DNE
115kinetic_linux-lts-xenial: DNE117kinetic_linux-lts-xenial: DNE
116trusty/esm_linux-lts-xenial: ignored (was needed ESM criteria)118trusty/esm_linux-lts-xenial: released (4.4.0-237.271~14.04.1)
117119
118Patches_linux-kvm:120Patches_linux-kvm:
119upstream_linux-kvm: released (6.2~rc3)121upstream_linux-kvm: released (6.2~rc3)
120esm-infra/xenial_linux-kvm: ignored (was needed ESM criteria)122esm-infra/xenial_linux-kvm: released (4.4.0-1117.127)
121trusty_linux-kvm: DNE123trusty_linux-kvm: DNE
122xenial_linux-kvm: ignored (end of standard support)124xenial_linux-kvm: ignored (end of standard support)
123bionic_linux-kvm: needed125bionic_linux-kvm: needed
@@ -135,7 +137,7 @@ bionic_linux-aws: needed
135focal_linux-aws: released (5.4.0-1097.105)137focal_linux-aws: released (5.4.0-1097.105)
136jammy_linux-aws: needed138jammy_linux-aws: needed
137kinetic_linux-aws: needed139kinetic_linux-aws: needed
138trusty/esm_linux-aws: ignored (was needed ESM criteria)140trusty/esm_linux-aws: released (4.4.0-1116.122)
139devel_linux-aws: needed141devel_linux-aws: needed
140142
141Patches_linux-aws-5.0:143Patches_linux-aws-5.0:
@@ -227,7 +229,7 @@ Patches_linux-azure-4.15:
227upstream_linux-azure-4.15: released (6.2~rc3)229upstream_linux-azure-4.15: released (6.2~rc3)
228trusty_linux-azure-4.15: DNE230trusty_linux-azure-4.15: DNE
229xenial_linux-azure-4.15: DNE231xenial_linux-azure-4.15: DNE
230bionic_linux-azure-4.15: needed232bionic_linux-azure-4.15: released (4.15.0-1162.177)
231focal_linux-azure-4.15: DNE233focal_linux-azure-4.15: DNE
232jammy_linux-azure-4.15: DNE234jammy_linux-azure-4.15: DNE
233kinetic_linux-azure-4.15: DNE235kinetic_linux-azure-4.15: DNE
diff --git a/active/CVE-2023-0266 b/active/CVE-2023-0266
index fee45a2..78ca91f 100644
--- a/active/CVE-2023-0266
+++ b/active/CVE-2023-0266
@@ -7,6 +7,7 @@ References:
7 https://ubuntu.com/security/notices/USN-5915-17 https://ubuntu.com/security/notices/USN-5915-1
8 https://ubuntu.com/security/notices/USN-5917-18 https://ubuntu.com/security/notices/USN-5917-1
9 https://ubuntu.com/security/notices/USN-5924-19 https://ubuntu.com/security/notices/USN-5924-1
10 https://ubuntu.com/security/notices/USN-5927-1
10Description:11Description:
11 A use after free vulnerability exists in the ALSA PCM package in the Linux12 A use after free vulnerability exists in the ALSA PCM package in the Linux
12 Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be13 Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be
@@ -229,7 +230,7 @@ Patches_linux-azure-4.15:
229upstream_linux-azure-4.15: released (6.2~rc4)230upstream_linux-azure-4.15: released (6.2~rc4)
230trusty_linux-azure-4.15: DNE231trusty_linux-azure-4.15: DNE
231xenial_linux-azure-4.15: DNE232xenial_linux-azure-4.15: DNE
232bionic_linux-azure-4.15: needed233bionic_linux-azure-4.15: released (4.15.0-1162.177)
233focal_linux-azure-4.15: DNE234focal_linux-azure-4.15: DNE
234jammy_linux-azure-4.15: DNE235jammy_linux-azure-4.15: DNE
235kinetic_linux-azure-4.15: DNE236kinetic_linux-azure-4.15: DNE
diff --git a/active/CVE-2023-0394 b/active/CVE-2023-0394
index 90e6e73..589081b 100644
--- a/active/CVE-2023-0394
+++ b/active/CVE-2023-0394
@@ -7,6 +7,7 @@ References:
7 https://git.kernel.org/linus/cb3e9864cdbe35ff6378966660edbcbac955fe17 (6.2-rc4)7 https://git.kernel.org/linus/cb3e9864cdbe35ff6378966660edbcbac955fe17 (6.2-rc4)
8 https://ubuntu.com/security/notices/USN-5917-18 https://ubuntu.com/security/notices/USN-5917-1
9 https://ubuntu.com/security/notices/USN-5924-19 https://ubuntu.com/security/notices/USN-5924-1
10 https://ubuntu.com/security/notices/USN-5927-1
10Description:11Description:
11 A NULL pointer dereference flaw was found in rawv6_push_pending_frames in12 A NULL pointer dereference flaw was found in rawv6_push_pending_frames in
12 net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw13 net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw
@@ -224,7 +225,7 @@ Patches_linux-azure-4.15:
224upstream_linux-azure-4.15: needs-triage225upstream_linux-azure-4.15: needs-triage
225trusty_linux-azure-4.15: DNE226trusty_linux-azure-4.15: DNE
226xenial_linux-azure-4.15: DNE227xenial_linux-azure-4.15: DNE
227bionic_linux-azure-4.15: needs-triage228bionic_linux-azure-4.15: released (4.15.0-1162.177)
228focal_linux-azure-4.15: DNE229focal_linux-azure-4.15: DNE
229jammy_linux-azure-4.15: DNE230jammy_linux-azure-4.15: DNE
230kinetic_linux-azure-4.15: DNE231kinetic_linux-azure-4.15: DNE
diff --git a/active/CVE-2023-0461 b/active/CVE-2023-0461
index 5734750..74fa5b6 100644
--- a/active/CVE-2023-0461
+++ b/active/CVE-2023-0461
@@ -13,6 +13,8 @@ References:
13 https://ubuntu.com/security/notices/USN-5919-113 https://ubuntu.com/security/notices/USN-5919-1
14 https://ubuntu.com/security/notices/USN-5920-114 https://ubuntu.com/security/notices/USN-5920-1
15 https://ubuntu.com/security/notices/USN-5924-115 https://ubuntu.com/security/notices/USN-5924-1
16 https://ubuntu.com/security/notices/USN-5925-1
17 https://ubuntu.com/security/notices/USN-5927-1
16Description:18Description:
17 There is a use-after-free vulnerability in the Linux Kernel which can be19 There is a use-after-free vulnerability in the Linux Kernel which can be
18 exploited to achieve local privilege escalation. To reach the vulnerability20 exploited to achieve local privilege escalation. To reach the vulnerability
@@ -142,7 +144,7 @@ upstream_linux-kvm: released (6.2~rc3)
142esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9)144esm-infra/xenial_linux-kvm: not-affected (4.4.0-1004.9)
143trusty_linux-kvm: DNE145trusty_linux-kvm: DNE
144xenial_linux-kvm: ignored (end of standard support)146xenial_linux-kvm: ignored (end of standard support)
145bionic_linux-kvm: pending (4.15.0-1136.141)147bionic_linux-kvm: released (4.15.0-1136.141)
146focal_linux-kvm: released (5.4.0-1087.93)148focal_linux-kvm: released (5.4.0-1087.93)
147jammy_linux-kvm: pending (5.15.0-1029.34)149jammy_linux-kvm: pending (5.15.0-1029.34)
148kinetic_linux-kvm: pending (5.19.0-1019.20)150kinetic_linux-kvm: pending (5.19.0-1019.20)
@@ -249,7 +251,7 @@ Patches_linux-azure-4.15:
249upstream_linux-azure-4.15: released (6.2~rc3)251upstream_linux-azure-4.15: released (6.2~rc3)
250trusty_linux-azure-4.15: DNE252trusty_linux-azure-4.15: DNE
251xenial_linux-azure-4.15: DNE253xenial_linux-azure-4.15: DNE
252bionic_linux-azure-4.15: needed254bionic_linux-azure-4.15: released (4.15.0-1162.177)
253focal_linux-azure-4.15: DNE255focal_linux-azure-4.15: DNE
254jammy_linux-azure-4.15: DNE256jammy_linux-azure-4.15: DNE
255kinetic_linux-azure-4.15: DNE257kinetic_linux-azure-4.15: DNE
@@ -767,7 +769,7 @@ Patches_linux-raspi2:
767upstream_linux-raspi2: released (6.2~rc3)769upstream_linux-raspi2: released (6.2~rc3)
768trusty_linux-raspi2: DNE770trusty_linux-raspi2: DNE
769xenial_linux-raspi2: ignored (end of standard support)771xenial_linux-raspi2: ignored (end of standard support)
770bionic_linux-raspi2: pending (4.15.0-1128.136)772bionic_linux-raspi2: released (4.15.0-1128.136)
771focal_linux-raspi2: ignored (replaced by linux-raspi)773focal_linux-raspi2: ignored (replaced by linux-raspi)
772jammy_linux-raspi2: DNE774jammy_linux-raspi2: DNE
773kinetic_linux-raspi2: DNE775kinetic_linux-raspi2: DNE
@@ -824,7 +826,7 @@ Patches_linux-snapdragon:
824upstream_linux-snapdragon: released (6.2~rc3)826upstream_linux-snapdragon: released (6.2~rc3)
825trusty_linux-snapdragon: DNE827trusty_linux-snapdragon: DNE
826xenial_linux-snapdragon: ignored (end of standard support)828xenial_linux-snapdragon: ignored (end of standard support)
827bionic_linux-snapdragon: pending (4.15.0-1146.156)829bionic_linux-snapdragon: released (4.15.0-1146.156)
828focal_linux-snapdragon: DNE830focal_linux-snapdragon: DNE
829jammy_linux-snapdragon: DNE831jammy_linux-snapdragon: DNE
830kinetic_linux-snapdragon: DNE832kinetic_linux-snapdragon: DNE
diff --git a/active/CVE-2023-0795 b/active/CVE-2023-0795
index 7dec1e4..483058d 100644
--- a/active/CVE-2023-0795
+++ b/active/CVE-2023-0795
@@ -1,3 +1,4 @@
1PublicDateAtUSN: 2023-02-13 23:15:00 UTC
1Candidate: CVE-2023-07952Candidate: CVE-2023-0795
2PublicDate: 2023-02-13 23:15:00 UTC3PublicDate: 2023-02-13 23:15:00 UTC
3References:4References:
@@ -5,6 +6,7 @@ References:
5 https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f686 https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
6 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0795.json7 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0795.json
7 https://gitlab.com/libtiff/libtiff/-/issues/4938 https://gitlab.com/libtiff/libtiff/-/issues/493
9 https://ubuntu.com/security/notices/USN-5923-1
8Description:10Description:
9 LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in11 LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in
10 tools/tiffcrop.c:3488, allowing attackers to cause a denial-of-service via12 tools/tiffcrop.c:3488, allowing attackers to cause a denial-of-service via
@@ -22,12 +24,12 @@ CVSS:
2224
23Patches_tiff:25Patches_tiff:
24upstream_tiff: needs-triage26upstream_tiff: needs-triage
25esm-infra/xenial_tiff: needed27esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10)
26trusty_tiff: ignored (out of standard support)28trusty_tiff: ignored (out of standard support)
27xenial_tiff: ignored (out of standard support)29xenial_tiff: ignored (out of standard support)
28bionic_tiff: needed30bionic_tiff: released (4.0.9-5ubuntu0.10)
29focal_tiff: needed31focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8)
30jammy_tiff: needed32jammy_tiff: released (4.3.0-6ubuntu0.4)
31kinetic_tiff: needed33kinetic_tiff: released (4.4.0-4ubuntu3.3)
32trusty/esm_tiff: needed34trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7)
33devel_tiff: needed35devel_tiff: needed
diff --git a/active/CVE-2023-0796 b/active/CVE-2023-0796
index ac71312..a30205c 100644
--- a/active/CVE-2023-0796
+++ b/active/CVE-2023-0796
@@ -1,3 +1,4 @@
1PublicDateAtUSN: 2023-02-13 23:15:00 UTC
1Candidate: CVE-2023-07962Candidate: CVE-2023-0796
2PublicDate: 2023-02-13 23:15:00 UTC3PublicDate: 2023-02-13 23:15:00 UTC
3References:4References:
@@ -5,6 +6,7 @@ References:
5 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0796.json6 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0796.json
6 https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f687 https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
7 https://gitlab.com/libtiff/libtiff/-/issues/4998 https://gitlab.com/libtiff/libtiff/-/issues/499
9 https://ubuntu.com/security/notices/USN-5923-1
8Description:10Description:
9 LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in11 LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in
10 tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via12 tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via
@@ -22,12 +24,12 @@ CVSS:
2224
23Patches_tiff:25Patches_tiff:
24upstream_tiff: needs-triage26upstream_tiff: needs-triage
25esm-infra/xenial_tiff: needed27esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10)
26trusty_tiff: ignored (out of standard support)28trusty_tiff: ignored (out of standard support)
27xenial_tiff: ignored (out of standard support)29xenial_tiff: ignored (out of standard support)
28bionic_tiff: needed30bionic_tiff: released (4.0.9-5ubuntu0.10)
29focal_tiff: needed31focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8)
30jammy_tiff: needed32jammy_tiff: released (4.3.0-6ubuntu0.4)
31kinetic_tiff: needed33kinetic_tiff: released (4.4.0-4ubuntu3.3)
32trusty/esm_tiff: needed34trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7)
33devel_tiff: needed35devel_tiff: needed
diff --git a/active/CVE-2023-0797 b/active/CVE-2023-0797
index 578240d..704dce7 100644
--- a/active/CVE-2023-0797
+++ b/active/CVE-2023-0797
@@ -1,3 +1,4 @@
1PublicDateAtUSN: 2023-02-13 23:15:00 UTC
1Candidate: CVE-2023-07972Candidate: CVE-2023-0797
2PublicDate: 2023-02-13 23:15:00 UTC3PublicDate: 2023-02-13 23:15:00 UTC
3References:4References:
@@ -5,6 +6,7 @@ References:
5 https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f686 https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
6 https://gitlab.com/libtiff/libtiff/-/issues/4957 https://gitlab.com/libtiff/libtiff/-/issues/495
7 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0797.json8 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0797.json
9 https://ubuntu.com/security/notices/USN-5923-1
8Description:10Description:
9 LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in11 LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in
10 libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and12 libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and
@@ -23,12 +25,12 @@ CVSS:
2325
24Patches_tiff:26Patches_tiff:
25upstream_tiff: needs-triage27upstream_tiff: needs-triage
26esm-infra/xenial_tiff: needed28esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10)
27trusty_tiff: ignored (out of standard support)29trusty_tiff: ignored (out of standard support)
28xenial_tiff: ignored (out of standard support)30xenial_tiff: ignored (out of standard support)
29bionic_tiff: needed31bionic_tiff: released (4.0.9-5ubuntu0.10)
30focal_tiff: needed32focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8)
31jammy_tiff: needed33jammy_tiff: released (4.3.0-6ubuntu0.4)
32kinetic_tiff: needed34kinetic_tiff: released (4.4.0-4ubuntu3.3)
33trusty/esm_tiff: needed35trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7)
34devel_tiff: needed36devel_tiff: needed
diff --git a/active/CVE-2023-0798 b/active/CVE-2023-0798
index 371f0f1..2921a4c 100644
--- a/active/CVE-2023-0798
+++ b/active/CVE-2023-0798
@@ -1,3 +1,4 @@
1PublicDateAtUSN: 2023-02-13 23:15:00 UTC
1Candidate: CVE-2023-07982Candidate: CVE-2023-0798
2PublicDate: 2023-02-13 23:15:00 UTC3PublicDate: 2023-02-13 23:15:00 UTC
3References:4References:
@@ -5,6 +6,7 @@ References:
5 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0798.json6 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0798.json
6 https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f687 https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
7 https://gitlab.com/libtiff/libtiff/-/issues/4928 https://gitlab.com/libtiff/libtiff/-/issues/492
9 https://ubuntu.com/security/notices/USN-5923-1
8Description:10Description:
9 LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in11 LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in
10 tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via12 tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via
@@ -22,12 +24,12 @@ CVSS:
2224
23Patches_tiff:25Patches_tiff:
24upstream_tiff: needs-triage26upstream_tiff: needs-triage
25esm-infra/xenial_tiff: needed27esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10)
26trusty_tiff: ignored (out of standard support)28trusty_tiff: ignored (out of standard support)
27xenial_tiff: ignored (out of standard support)29xenial_tiff: ignored (out of standard support)
28bionic_tiff: needed30bionic_tiff: released (4.0.9-5ubuntu0.10)
29focal_tiff: needed31focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8)
30jammy_tiff: needed32jammy_tiff: released (4.3.0-6ubuntu0.4)
31kinetic_tiff: needed33kinetic_tiff: released (4.4.0-4ubuntu3.3)
32trusty/esm_tiff: needed34trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7)
33devel_tiff: needed35devel_tiff: needed
diff --git a/active/CVE-2023-0799 b/active/CVE-2023-0799
index 67d434b..aa4f1b2 100644
--- a/active/CVE-2023-0799
+++ b/active/CVE-2023-0799
@@ -1,3 +1,4 @@
1PublicDateAtUSN: 2023-02-13 23:15:00 UTC
1Candidate: CVE-2023-07992Candidate: CVE-2023-0799
2PublicDate: 2023-02-13 23:15:00 UTC3PublicDate: 2023-02-13 23:15:00 UTC
3References:4References:
@@ -5,6 +6,7 @@ References:
5 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0799.json6 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0799.json
6 https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f687 https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
7 https://gitlab.com/libtiff/libtiff/-/issues/4948 https://gitlab.com/libtiff/libtiff/-/issues/494
9 https://ubuntu.com/security/notices/USN-5923-1
8Description:10Description:
9 LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in11 LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in
10 tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via12 tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via
@@ -22,12 +24,12 @@ CVSS:
2224
23Patches_tiff:25Patches_tiff:
24upstream_tiff: needs-triage26upstream_tiff: needs-triage
25esm-infra/xenial_tiff: needed27esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10)
26trusty_tiff: ignored (out of standard support)28trusty_tiff: ignored (out of standard support)
27xenial_tiff: ignored (out of standard support)29xenial_tiff: ignored (out of standard support)
28bionic_tiff: needed30bionic_tiff: released (4.0.9-5ubuntu0.10)
29focal_tiff: needed31focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8)
30jammy_tiff: needed32jammy_tiff: released (4.3.0-6ubuntu0.4)
31kinetic_tiff: needed33kinetic_tiff: released (4.4.0-4ubuntu3.3)
32trusty/esm_tiff: needed34trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7)
33devel_tiff: needed35devel_tiff: needed
diff --git a/active/CVE-2023-0800 b/active/CVE-2023-0800
index f75dbe3..157e62e 100644
--- a/active/CVE-2023-0800
+++ b/active/CVE-2023-0800
@@ -1,3 +1,4 @@
1PublicDateAtUSN: 2023-02-13 23:15:00 UTC
1Candidate: CVE-2023-08002Candidate: CVE-2023-0800
2PublicDate: 2023-02-13 23:15:00 UTC3PublicDate: 2023-02-13 23:15:00 UTC
3References:4References:
@@ -5,6 +6,7 @@ References:
5 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0800.json6 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0800.json
6 https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f007 https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
7 https://gitlab.com/libtiff/libtiff/-/issues/4968 https://gitlab.com/libtiff/libtiff/-/issues/496
9 https://ubuntu.com/security/notices/USN-5923-1
8Description:10Description:
9 LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in11 LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in
10 tools/tiffcrop.c:3502, allowing attackers to cause a denial-of-service via12 tools/tiffcrop.c:3502, allowing attackers to cause a denial-of-service via
@@ -22,12 +24,12 @@ CVSS:
2224
23Patches_tiff:25Patches_tiff:
24upstream_tiff: needs-triage26upstream_tiff: needs-triage
25esm-infra/xenial_tiff: needed27esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10)
26trusty_tiff: ignored (out of standard support)28trusty_tiff: ignored (out of standard support)
27xenial_tiff: ignored (out of standard support)29xenial_tiff: ignored (out of standard support)
28bionic_tiff: needed30bionic_tiff: released (4.0.9-5ubuntu0.10)
29focal_tiff: needed31focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8)
30jammy_tiff: needed32jammy_tiff: released (4.3.0-6ubuntu0.4)
31kinetic_tiff: needed33kinetic_tiff: released (4.4.0-4ubuntu3.3)
32trusty/esm_tiff: needed34trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7)
33devel_tiff: needed35devel_tiff: needed
diff --git a/active/CVE-2023-0801 b/active/CVE-2023-0801
index 27f6a21..afea0fe 100644
--- a/active/CVE-2023-0801
+++ b/active/CVE-2023-0801
@@ -1,3 +1,4 @@
1PublicDateAtUSN: 2023-02-13 23:15:00 UTC
1Candidate: CVE-2023-08012Candidate: CVE-2023-0801
2PublicDate: 2023-02-13 23:15:00 UTC3PublicDate: 2023-02-13 23:15:00 UTC
3References:4References:
@@ -5,6 +6,7 @@ References:
5 https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f006 https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
6 https://gitlab.com/libtiff/libtiff/-/issues/4987 https://gitlab.com/libtiff/libtiff/-/issues/498
7 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0801.json8 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0801.json
9 https://ubuntu.com/security/notices/USN-5923-1
8Description:10Description:
9 LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in11 LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in
10 libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and12 libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and
@@ -23,12 +25,12 @@ CVSS:
2325
24Patches_tiff:26Patches_tiff:
25upstream_tiff: needs-triage27upstream_tiff: needs-triage
26esm-infra/xenial_tiff: needed28esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10)
27trusty_tiff: ignored (out of standard support)29trusty_tiff: ignored (out of standard support)
28xenial_tiff: ignored (out of standard support)30xenial_tiff: ignored (out of standard support)
29bionic_tiff: needed31bionic_tiff: released (4.0.9-5ubuntu0.10)
30focal_tiff: needed32focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8)
31jammy_tiff: needed33jammy_tiff: released (4.3.0-6ubuntu0.4)
32kinetic_tiff: needed34kinetic_tiff: released (4.4.0-4ubuntu3.3)
33trusty/esm_tiff: needed35trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7)
34devel_tiff: needed36devel_tiff: needed
diff --git a/active/CVE-2023-0802 b/active/CVE-2023-0802
index fc74216..6f171af 100644
--- a/active/CVE-2023-0802
+++ b/active/CVE-2023-0802
@@ -1,3 +1,4 @@
1PublicDateAtUSN: 2023-02-13 23:15:00 UTC
1Candidate: CVE-2023-08022Candidate: CVE-2023-0802
2PublicDate: 2023-02-13 23:15:00 UTC3PublicDate: 2023-02-13 23:15:00 UTC
3References:4References:
@@ -5,6 +6,7 @@ References:
5 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0802.json6 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0802.json
6 https://gitlab.com/libtiff/libtiff/-/issues/5007 https://gitlab.com/libtiff/libtiff/-/issues/500
7 https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f008 https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
9 https://ubuntu.com/security/notices/USN-5923-1
8Description:10Description:
9 LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in11 LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in
10 tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via12 tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via
@@ -22,12 +24,12 @@ CVSS:
2224
23Patches_tiff:25Patches_tiff:
24upstream_tiff: needs-triage26upstream_tiff: needs-triage
25esm-infra/xenial_tiff: needed27esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10)
26trusty_tiff: ignored (out of standard support)28trusty_tiff: ignored (out of standard support)
27xenial_tiff: ignored (out of standard support)29xenial_tiff: ignored (out of standard support)
28bionic_tiff: needed30bionic_tiff: released (4.0.9-5ubuntu0.10)
29focal_tiff: needed31focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8)
30jammy_tiff: needed32jammy_tiff: released (4.3.0-6ubuntu0.4)
31kinetic_tiff: needed33kinetic_tiff: released (4.4.0-4ubuntu3.3)
32trusty/esm_tiff: needed34trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7)
33devel_tiff: needed35devel_tiff: needed
diff --git a/active/CVE-2023-0803 b/active/CVE-2023-0803
index a6c66ad..8d7afc4 100644
--- a/active/CVE-2023-0803
+++ b/active/CVE-2023-0803
@@ -1,3 +1,4 @@
1PublicDateAtUSN: 2023-02-13 23:15:00 UTC
1Candidate: CVE-2023-08032Candidate: CVE-2023-0803
2PublicDate: 2023-02-13 23:15:00 UTC3PublicDate: 2023-02-13 23:15:00 UTC
3References:4References:
@@ -5,6 +6,7 @@ References:
5 https://gitlab.com/libtiff/libtiff/-/issues/5016 https://gitlab.com/libtiff/libtiff/-/issues/501
6 https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f007 https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
7 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0803.json8 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0803.json
9 https://ubuntu.com/security/notices/USN-5923-1
8Description:10Description:
9 LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in11 LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in
10 tools/tiffcrop.c:3516, allowing attackers to cause a denial-of-service via12 tools/tiffcrop.c:3516, allowing attackers to cause a denial-of-service via
@@ -22,12 +24,12 @@ CVSS:
2224
23Patches_tiff:25Patches_tiff:
24upstream_tiff: needs-triage26upstream_tiff: needs-triage
25esm-infra/xenial_tiff: needed27esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10)
26trusty_tiff: ignored (out of standard support)28trusty_tiff: ignored (out of standard support)
27xenial_tiff: ignored (out of standard support)29xenial_tiff: ignored (out of standard support)
28bionic_tiff: needed30bionic_tiff: released (4.0.9-5ubuntu0.10)
29focal_tiff: needed31focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8)
30jammy_tiff: needed32jammy_tiff: released (4.3.0-6ubuntu0.4)
31kinetic_tiff: needed33kinetic_tiff: released (4.4.0-4ubuntu3.3)
32trusty/esm_tiff: needed34trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7)
33devel_tiff: needed35devel_tiff: needed
diff --git a/active/CVE-2023-0804 b/active/CVE-2023-0804
index ca75e81..465e815 100644
--- a/active/CVE-2023-0804
+++ b/active/CVE-2023-0804
@@ -1,3 +1,4 @@
1PublicDateAtUSN: 2023-02-13 23:15:00 UTC
1Candidate: CVE-2023-08042Candidate: CVE-2023-0804
2PublicDate: 2023-02-13 23:15:00 UTC3PublicDate: 2023-02-13 23:15:00 UTC
3References:4References:
@@ -5,6 +6,7 @@ References:
5 https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f006 https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
6 https://gitlab.com/libtiff/libtiff/-/issues/4977 https://gitlab.com/libtiff/libtiff/-/issues/497
7 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0804.json8 https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0804.json
9 https://ubuntu.com/security/notices/USN-5923-1
8Description:10Description:
9 LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in11 LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in
10 tools/tiffcrop.c:3609, allowing attackers to cause a denial-of-service via12 tools/tiffcrop.c:3609, allowing attackers to cause a denial-of-service via
@@ -22,12 +24,12 @@ CVSS:
2224
23Patches_tiff:25Patches_tiff:
24upstream_tiff: needs-triage26upstream_tiff: needs-triage
25esm-infra/xenial_tiff: needed27esm-infra/xenial_tiff: released (4.0.6-1ubuntu0.8+esm10)
26trusty_tiff: ignored (out of standard support)28trusty_tiff: ignored (out of standard support)
27xenial_tiff: ignored (out of standard support)29xenial_tiff: ignored (out of standard support)
28bionic_tiff: needed30bionic_tiff: released (4.0.9-5ubuntu0.10)
29focal_tiff: needed31focal_tiff: released (4.1.0+git191117-2ubuntu0.20.04.8)
30jammy_tiff: needed32jammy_tiff: released (4.3.0-6ubuntu0.4)
31trusty/esm_tiff: needed33trusty/esm_tiff: released (4.0.3-7ubuntu0.11+esm7)
32kinetic_tiff: needed34kinetic_tiff: released (4.4.0-4ubuntu3.3)
33devel_tiff: needed35devel_tiff: needed
diff --git a/active/CVE-2023-23455 b/active/CVE-2023-23455
index e2cbebb..23cd932 100644
--- a/active/CVE-2023-23455
+++ b/active/CVE-2023-23455
@@ -10,6 +10,7 @@ References:
10 https://ubuntu.com/security/notices/USN-5915-110 https://ubuntu.com/security/notices/USN-5915-1
11 https://ubuntu.com/security/notices/USN-5917-111 https://ubuntu.com/security/notices/USN-5917-1
12 https://ubuntu.com/security/notices/USN-5924-112 https://ubuntu.com/security/notices/USN-5924-1
13 https://ubuntu.com/security/notices/USN-5927-1
13Description:14Description:
14 atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.415 atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4
15 allows attackers to cause a denial of service because of type confusion16 allows attackers to cause a denial of service because of type confusion
@@ -231,7 +232,7 @@ Patches_linux-azure-4.15:
231upstream_linux-azure-4.15: released (6.2~rc3)232upstream_linux-azure-4.15: released (6.2~rc3)
232trusty_linux-azure-4.15: DNE233trusty_linux-azure-4.15: DNE
233xenial_linux-azure-4.15: DNE234xenial_linux-azure-4.15: DNE
234bionic_linux-azure-4.15: pending (4.15.0-1162.177)235bionic_linux-azure-4.15: released (4.15.0-1162.177)
235focal_linux-azure-4.15: DNE236focal_linux-azure-4.15: DNE
236jammy_linux-azure-4.15: DNE237jammy_linux-azure-4.15: DNE
237kinetic_linux-azure-4.15: DNE238kinetic_linux-azure-4.15: DNE
diff --git a/active/CVE-2023-23559 b/active/CVE-2023-23559
index c54692a..8987ae0 100644
--- a/active/CVE-2023-23559
+++ b/active/CVE-2023-23559
@@ -6,6 +6,8 @@ References:
6 https://patchwork.kernel.org/project/linux-wireless/patch/20230110173007.57110-1-szymon.heidrich@gmail.com/6 https://patchwork.kernel.org/project/linux-wireless/patch/20230110173007.57110-1-szymon.heidrich@gmail.com/
7 https://ubuntu.com/security/notices/USN-5884-17 https://ubuntu.com/security/notices/USN-5884-1
8 https://ubuntu.com/security/notices/USN-5924-18 https://ubuntu.com/security/notices/USN-5924-1
9 https://ubuntu.com/security/notices/USN-5926-1
10 https://ubuntu.com/security/notices/USN-5927-1
9Description:11Description:
10 In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel12 In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel
11 through 6.1.5, there is an integer overflow in an addition.13 through 6.1.5, there is an integer overflow in an addition.
@@ -26,7 +28,7 @@ CVSS:
26Patches_linux:28Patches_linux:
27 break-fix: 80f8c5b434f94926c6489d7350d58aecb53ab70f b870e73a56c4cccbec33224233eaf295839f228c29 break-fix: 80f8c5b434f94926c6489d7350d58aecb53ab70f b870e73a56c4cccbec33224233eaf295839f228c
28upstream_linux: released (6.2~rc5)30upstream_linux: released (6.2~rc5)
29esm-infra/xenial_linux: pending31esm-infra/xenial_linux: released (4.4.0-237.271)
30trusty_linux: ignored (out of standard support)32trusty_linux: ignored (out of standard support)
31xenial_linux: ignored (out of standard support)33xenial_linux: ignored (out of standard support)
32bionic_linux: pending (4.15.0-207.218)34bionic_linux: pending (4.15.0-207.218)
@@ -109,11 +111,11 @@ bionic_linux-lts-xenial: DNE
109focal_linux-lts-xenial: DNE111focal_linux-lts-xenial: DNE
110jammy_linux-lts-xenial: DNE112jammy_linux-lts-xenial: DNE
111kinetic_linux-lts-xenial: DNE113kinetic_linux-lts-xenial: DNE
112trusty/esm_linux-lts-xenial: pending114trusty/esm_linux-lts-xenial: released (4.4.0-237.271~14.04.1)
113115
114Patches_linux-kvm:116Patches_linux-kvm:
115upstream_linux-kvm: released (6.2~rc5)117upstream_linux-kvm: released (6.2~rc5)
116esm-infra/xenial_linux-kvm: pending118esm-infra/xenial_linux-kvm: released (4.4.0-1117.127)
117trusty_linux-kvm: DNE119trusty_linux-kvm: DNE
118xenial_linux-kvm: ignored (end of standard support)120xenial_linux-kvm: ignored (end of standard support)
119bionic_linux-kvm: needed121bionic_linux-kvm: needed
@@ -131,7 +133,7 @@ bionic_linux-aws: needed
131focal_linux-aws: needed133focal_linux-aws: needed
132jammy_linux-aws: needed134jammy_linux-aws: needed
133kinetic_linux-aws: needed135kinetic_linux-aws: needed
134trusty/esm_linux-aws: pending136trusty/esm_linux-aws: released (4.4.0-1116.122)
135devel_linux-aws: needed137devel_linux-aws: needed
136138
137Patches_linux-aws-5.0:139Patches_linux-aws-5.0:
@@ -223,7 +225,7 @@ Patches_linux-azure-4.15:
223upstream_linux-azure-4.15: released (6.2~rc5)225upstream_linux-azure-4.15: released (6.2~rc5)
224trusty_linux-azure-4.15: DNE226trusty_linux-azure-4.15: DNE
225xenial_linux-azure-4.15: DNE227xenial_linux-azure-4.15: DNE
226bionic_linux-azure-4.15: pending (4.15.0-1162.177)228bionic_linux-azure-4.15: released (4.15.0-1162.177)
227focal_linux-azure-4.15: DNE229focal_linux-azure-4.15: DNE
228jammy_linux-azure-4.15: DNE230jammy_linux-azure-4.15: DNE
229kinetic_linux-azure-4.15: DNE231kinetic_linux-azure-4.15: DNE
diff --git a/scripts/packages-mirror b/scripts/packages-mirror
index 3b08dc1..6bac3b4 100755
--- a/scripts/packages-mirror
+++ b/scripts/packages-mirror
@@ -18,6 +18,7 @@ help() {
18 cat <<EOM18 cat <<EOM
19Usage: packages_mirror [OPTIONS]19Usage: packages_mirror [OPTIONS]
2020
21 -w use wget instead of rsync to fetch the mirror contents
21 -t use timestamps (ie, don't update files if they have been22 -t use timestamps (ie, don't update files if they have been
22 updated within the last day)23 updated within the last day)
23 -f when using timestamps, force updating the files24 -f when using timestamps, force updating the files
@@ -31,9 +32,10 @@ EOM
31}32}
3233
33find_devel_release() {34find_devel_release() {
34 PYTHONPATH="$(dirname $0)" python3 -c "import cve_lib; print(cve_lib.devel_release)" || true35 PYTHONPATH="$(dirname "$0")" python3 -c "import cve_lib; print(cve_lib.devel_release)" || true
35}36}
3637
38use_wget="no"
37use_timestamp="no"39use_timestamp="no"
38force_timestamp="no"40force_timestamp="no"
39verbosity_args="-q"41verbosity_args="-q"
@@ -43,9 +45,10 @@ very_verbose=""
43only_partner="no"45only_partner="no"
44only_ubuntu="no"46only_ubuntu="no"
4547
46while getopts "AhftvVpur:" opt48while getopts "AwhftvVpur:" opt
47do49do
48 case "$opt" in50 case "$opt" in
51 w) use_wget="yes";;
49 f) force_timestamp="yes";;52 f) force_timestamp="yes";;
50 t) use_timestamp="yes";;53 t) use_timestamp="yes";;
51 v) verbosity_args="";;54 v) verbosity_args="";;
@@ -63,9 +66,11 @@ shift $((OPTIND - 1))
6366
64#server=se.archive.ubuntu.com67#server=se.archive.ubuntu.com
65#server=us.archive.ubuntu.com68#server=us.archive.ubuntu.com
66server=archive.ubuntu.com69server=${server:-archive.ubuntu.com}
67ports=${ports:-ports.ubuntu.com}70ports=${ports:-ports.ubuntu.com}
71debian=${debian:-ftp.debian.org}
6872
73# shellcheck disable=SC1091
69. "$HOME"/.ubuntu-cve-tracker.conf74. "$HOME"/.ubuntu-cve-tracker.conf
7075
71for var in packages_mirror debian_mirror partner_mirror; do76for var in packages_mirror debian_mirror partner_mirror; do
@@ -74,16 +79,19 @@ for var in packages_mirror debian_mirror partner_mirror; do
74 exit 179 exit 1
75 fi80 fi
76done81done
82# shellcheck disable=SC2154
77outPath=$packages_mirror83outPath=$packages_mirror
78mkdir -p "$outPath"84mkdir -p "$outPath"
7985
86# shellcheck disable=SC2154
80debianPath=$debian_mirror87debianPath=$debian_mirror
81mkdir -p "$debianPath"88mkdir -p "$debianPath"
8289
90# shellcheck disable=SC2154
83partnerPath=$partner_mirror91partnerPath=$partner_mirror
84mkdir -p "$partnerPath"92mkdir -p "$partnerPath"
8593
86partner_dir_excludes=$(PYTHONPATH="${PYTHONPATH:+$PYTHONPATH:}$(dirname $0)" python3 -c '#94partner_dir_excludes=$(PYTHONPATH="${PYTHONPATH:+$PYTHONPATH:}$(dirname "$0")" python3 -c '#
87import cve_lib, sys95import cve_lib, sys
88s = ""96s = ""
89for r in cve_lib.eol_releases + ["breezy", "warty", "hoary"]:97for r in cve_lib.eol_releases + ["breezy", "warty", "hoary"]:
@@ -161,9 +169,9 @@ function gen_packages()
161 do169 do
162 for arch in $arches170 for arch in $arches
163 do171 do
164 spew_bin_lines $rel $repo $arch172 spew_bin_lines "$rel" "$repo" "$arch"
165 done173 done
166 spew_src_lines $rel $repo174 spew_src_lines "$rel" "$repo"
167 done175 done
168 done176 done
169}177}
@@ -185,9 +193,21 @@ function pull_packages()
185 log=$(mktemp -t rsync-XXXXXX)193 log=$(mktemp -t rsync-XXXXXX)
186 set +e194 set +e
187 if [ "$verbosity_args" != "-q" ]; then195 if [ "$verbosity_args" != "-q" ]; then
188 rsync -rlptv --progress --files-from="$filelist" $url $outPath/ 2>&1 | tee "$log"196 if [ "$use_wget" != "no" ]; then
197 # need to cut dirs to remove any extra dir prefixes
198 cutdirs=$(echo "$url" | grep -o "/" | wc -l)
199 wget -N -np -i "$filelist" --base "http://$url/" --directory-prefix "$outPath/" --force-directories --no-host-directories --cut-dirs="$cutdirs" 2>&1 | tee "$log"
200 else
201 rsync -rlptv --progress --files-from="$filelist" "rsync://$url" "$outPath/" 2>&1 | tee "$log"
202 fi
189 else203 else
190 rsync -rlptq --files-from="$filelist" $url $outPath/ >"$log" 2>&1204 if [ "$use_wget" != "no" ]; then
205 # need to cut dirs to remove any extra dir prefixes
206 cutdirs=$(echo "$url" | grep -o "/" | wc -l)
207 wget --quiet -N -np -i "$filelist" --base "http://$url" --directory-prefix "$outPath/" --force-directories --no-host-directories --cut-dirs="$cutdirs" >"$log" 2>&1
208 else
209 rsync -rlptq --files-from="$filelist" "rsync://$url" "$outPath/" >"$log" 2>&1
210 fi
191 fi211 fi
192 rc=$?212 rc=$?
193213
@@ -196,9 +216,7 @@ function pull_packages()
196 break216 break
197 fi217 fi
198 count=$((count + 1))218 count=$((count + 1))
199 if [ "$verbosity_args" != "-q" ]; then219 echo "Try: $count (rc: $rc)" >&2
200 echo "Try: $count" >&2
201 fi
202 done220 done
203 set -e221 set -e
204 OUT=$(< "$log" grep -Ev '(debian-installer|^rsync.*code 23)' || true)222 OUT=$(< "$log" grep -Ev '(debian-installer|^rsync.*code 23)' || true)
@@ -210,11 +228,14 @@ function pull_packages()
210 fi228 fi
211229
212 # Some unknown error -- die230 # Some unknown error -- die
213 if [ $rc -ne 0 ] && [ $rc -ne 23 ]; then231 if [ "$rc" -ne 0 ] && [ "$rc" -ne 23 ]; then
232 echo "failed: rc: $rc"
214 return 1233 return 1
215 fi234 fi
216 # Missing files (rc 23), die only if it's not a debian-installer path235 # Missing files (rc 23), die only if it's not a debian-installer path
217 if [ $rc -eq 23 ] && [ -n "$OUT" ]; then236 if [ "$rc" -eq 23 ] && [ -n "$OUT" ]; then
237 echo "failed: rc: $rc"
238 echo "$OUT"
218 return 1239 return 1
219 fi240 fi
220241
@@ -255,7 +276,7 @@ function do_use_timestamp() {
255 elif [ ! -e "$1" ]; then276 elif [ ! -e "$1" ]; then
256 return 0277 return 0
257 else278 else
258 tmp=$(find "$1" -mtime +$mtime)279 tmp=$(find "$1" -mtime "+$mtime")
259 if [ -n "$tmp" ]; then280 if [ -n "$tmp" ]; then
260 return 0281 return 0
261 fi282 fi
@@ -269,27 +290,30 @@ if [ "$only_partner" = "no" ]; then
269 timestamp="${outPath}.timestamp"290 timestamp="${outPath}.timestamp"
270 if [ ! -e "${outPath}/dists" ] || do_use_timestamp "$timestamp" ; then291 if [ ! -e "${outPath}/dists" ] || do_use_timestamp "$timestamp" ; then
271 pull=$(mktemp -t packages-XXXXXX)292 pull=$(mktemp -t packages-XXXXXX)
293 # shellcheck disable=SC2064
272 trap "rm -f $pull" EXIT HUP INT QUIT TERM294 trap "rm -f $pull" EXIT HUP INT QUIT TERM
273295
274 # Sync Packages for non-ports supported arches296 # Sync Packages for non-ports supported arches
275 if [ "$verbosity_args" != "-q" ]; then297 if [ "$verbosity_args" != "-q" ]; then
276 echo "Generating arch lists"298 echo "Generating arch lists"
277 fi299 fi
300 # shellcheck disable=SC2129
278 gen_packages trusty "amd64 i386" >> "$pull"301 gen_packages trusty "amd64 i386" >> "$pull"
279 gen_packages xenial "amd64 i386" >> "$pull"302 gen_packages xenial "amd64 i386" >> "$pull"
280 gen_packages bionic "amd64 i386" >> "$pull"303 gen_packages bionic "amd64 i386" >> "$pull"
281 gen_packages focal "amd64 i386" >> "$pull"304 gen_packages focal "amd64 i386" >> "$pull"
282 gen_packages jammy "amd64 i386" >> "$pull"305 gen_packages jammy "amd64 i386" >> "$pull"
283 gen_packages kinetic "amd64 i386" >> "$pull"306 gen_packages kinetic "amd64 i386" >> "$pull"
284 gen_packages lunar "amd64 i386" >> "$pull"307 gen_packages lunar "amd64 i386" >> "$pull"
285308
286 pull_packages "$pull" rsync://$server/ubuntu || echo "FAIL: supported architectures" >&2309 pull_packages "$pull" "$server/ubuntu" || echo "FAIL: supported architectures" >&2
287 cat /dev/null > "$pull"310 cat /dev/null > "$pull"
288311
289 # Sync Packages for ports arches312 # Sync Packages for ports arches
290 if [ "$verbosity_args" != "-q" ]; then313 if [ "$verbosity_args" != "-q" ]; then
291 echo "Generating ports arch lists"314 echo "Generating ports arch lists"
292 fi315 fi
316 # shellcheck disable=SC2129
293 gen_packages trusty "powerpc ppc64el armhf arm64" >> "$pull"317 gen_packages trusty "powerpc ppc64el armhf arm64" >> "$pull"
294 gen_packages xenial "powerpc ppc64el armhf arm64 s390x" >> "$pull"318 gen_packages xenial "powerpc ppc64el armhf arm64 s390x" >> "$pull"
295 gen_packages bionic "ppc64el armhf arm64 s390x" >> "$pull"319 gen_packages bionic "ppc64el armhf arm64 s390x" >> "$pull"
@@ -298,7 +322,7 @@ if [ "$only_partner" = "no" ]; then
298 gen_packages kinetic "ppc64el armhf arm64 s390x riscv64" >> "$pull"322 gen_packages kinetic "ppc64el armhf arm64 s390x riscv64" >> "$pull"
299 gen_packages lunar "ppc64el armhf arm64 s390x riscv64" >> "$pull"323 gen_packages lunar "ppc64el armhf arm64 s390x riscv64" >> "$pull"
300324
301 pull_packages "$pull" rsync://$ports/ubuntu-ports || echo "FAIL: ports architectures" >&2325 pull_packages "$pull" "$ports/ubuntu-ports" || echo "FAIL: ports architectures" >&2
302 cat /dev/null > "$pull"326 cat /dev/null > "$pull"
303327
304 if [ "$use_timestamp" = "yes" ]; then328 if [ "$use_timestamp" = "yes" ]; then
@@ -325,11 +349,11 @@ if [ "$only_ubuntu" = "no" ]; then
325 cd "$debianPath"349 cd "$debianPath"
326 for i in main contrib non-free350 for i in main contrib non-free
327 do351 do
328 wget $verbosity_args -N -R '*=*' -R 'Contents*' -X '/debian/dists/testing/*/source/Sources.diff,/debian/dists/testing/*/source/by-hash' -np -r http://ftp.debian.org/debian/dists/testing/$i/source/352 wget $verbosity_args -N -R '*=*' -R 'Contents*' -X '/debian/dists/testing/*/source/Sources.diff,/debian/dists/testing/*/source/by-hash' -np -r "http://$debian/debian/dists/testing/$i/source/"
329 done353 done
330 ln -sf ftp.debian.org/debian/dists dists354 ln -sf "$debian/debian/dists" dists
331 # remove dangling symlink355 # remove dangling symlink
332 rm -f ftp.debian.org/debian/dists/dists || true356 rm -f "$debian/debian/dists/dists" || true
333357
334 if [ "$use_timestamp" = "yes" ]; then358 if [ "$use_timestamp" = "yes" ]; then
335 touch "$timestamp"359 touch "$timestamp"
@@ -360,7 +384,7 @@ if [ "$only_ubuntu" = "no" ]; then
360 rm -f "$timestamp"384 rm -f "$timestamp"
361 fi385 fi
362 has_sources=$(find archive.canonical.com/dists -name Sources$)386 has_sources=$(find archive.canonical.com/dists -name Sources$)
363 if [ ! -z "$has_sources" ]; then387 if [ -n "$has_sources" ]; then
364 echo ""388 echo ""
365 echo "WARNING: $partnerPath has Sources files! These should be removed now that -partner uses Sources.gz"389 echo "WARNING: $partnerPath has Sources files! These should be removed now that -partner uses Sources.gz"
366 fi390 fi
@@ -370,5 +394,5 @@ fi
370394
371# generate source package lists for umt grep395# generate source package lists for umt grep
372for path in "$outPath" "$debianPath" "$partnerPath"; do396for path in "$outPath" "$debianPath" "$partnerPath"; do
373 find $path -name Sources.gz -exec zgrep '^Package: .*' {} \; | cut -c10- | sort -u > $path/sources397 find "$path" -name Sources.gz -exec zgrep '^Package: .*' {} \; | cut -c10- | sort -u > "$path/sources"
374done398done

Subscribers

People subscribed via source and target branches