Merge ~pfsmorigo/ubuntu-cve-tracker:pfsmorigo/add_endpont_argument into ubuntu-cve-tracker:master
- Git
- lp:~pfsmorigo/ubuntu-cve-tracker
- pfsmorigo/add_endpont_argument
- Merge into master
Proposed by
Paulo Flabiano Smorigo
Status: | Merged |
---|---|
Merge reported by: | Paulo Flabiano Smorigo |
Merged at revision: | d17cea6985a4ab0fd954d17d738df44bfa62fdce |
Proposed branch: | ~pfsmorigo/ubuntu-cve-tracker:pfsmorigo/add_endpont_argument |
Merge into: | ubuntu-cve-tracker:master |
Diff against target: |
3939 lines (+3623/-25) 28 files modified
active/CVE-2021-3449 (+1/-1) active/CVE-2022-20565 (+757/-0) active/CVE-2022-20566 (+757/-0) active/CVE-2022-20567 (+757/-0) active/CVE-2022-20568 (+759/-0) active/CVE-2022-23467 (+33/-0) active/CVE-2022-37325 (+28/-0) active/CVE-2022-38533 (+7/-5) active/CVE-2022-40303 (+3/-2) active/CVE-2022-40304 (+3/-2) active/CVE-2022-4170 (+27/-0) active/CVE-2022-42705 (+29/-0) active/CVE-2022-42706 (+29/-0) active/CVE-2022-42919 (+1/-1) active/CVE-2022-4292 (+29/-0) active/CVE-2022-4293 (+30/-0) active/CVE-2022-43497 (+28/-0) active/CVE-2022-43500 (+28/-0) active/CVE-2022-43504 (+29/-0) active/CVE-2022-43515 (+31/-0) active/CVE-2022-45283 (+27/-0) active/CVE-2022-46169 (+78/-0) check-cves.log (+2/-0) ignored/not-for-us.txt (+87/-0) retired/CVE-2022-43516 (+29/-0) scripts/check-cves-mode.el (+25/-10) scripts/cve-mode.el (+1/-1) scripts/publish-cves-to-website-api.py (+8/-3) |
Related bugs: |
Reviewer | Review Type | Date Requested | Status |
---|---|---|---|
Steve Beattie | Approve | ||
Alex Murray | Approve | ||
Review via email: mp+434171@code.launchpad.net |
Commit message
Description of the change
To post a comment you must log in.
Revision history for this message
Steve Beattie (sbeattie) wrote : | # |
Agreed, LGTM, please merge.
It might make sense in a followup commit to convert to using argparse's formatter_
Thanks!
review:
Approve
Preview Diff
[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1 | diff --git a/active/CVE-2021-3449 b/active/CVE-2021-3449 |
2 | index 76361e6..4b45060 100644 |
3 | --- a/active/CVE-2021-3449 |
4 | +++ b/active/CVE-2021-3449 |
5 | @@ -143,7 +143,7 @@ upstream_postgresql-9.5: needs-triage |
6 | trusty_postgresql-9.5: DNE |
7 | trusty/esm_postgresql-9.5: DNE |
8 | xenial_postgresql-9.5: ignored (end of standard support, was needs-triage) |
9 | -esm-infra/xenial_postgresql-9.5: needs-triage |
10 | +esm-infra/xenial_postgresql-9.5: not-affected (code not present) |
11 | bionic_postgresql-9.5: DNE |
12 | focal_postgresql-9.5: DNE |
13 | hirsute_postgresql-9.5: DNE |
14 | diff --git a/active/CVE-2022-20565 b/active/CVE-2022-20565 |
15 | new file mode 100644 |
16 | index 0000000..c8207ef |
17 | --- /dev/null |
18 | +++ b/active/CVE-2022-20565 |
19 | @@ -0,0 +1,757 @@ |
20 | +Candidate: CVE-2022-20565 |
21 | +PublicDate: 2022-12-06 |
22 | +References: |
23 | + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20565 |
24 | + https://git.kernel.org/linus/bce1305c0ece3dc549663605e567655dd701752c |
25 | +Description: |
26 | + [Unknown description] |
27 | +Ubuntu-Description: |
28 | +Notes: |
29 | +Mitigation: |
30 | +Bugs: |
31 | +Priority: medium |
32 | +Discovered-by: |
33 | +Assigned-to: |
34 | +CVSS: |
35 | + |
36 | +Patches_linux: |
37 | + break-fix: - bce1305c0ece3dc549663605e567655dd701752c |
38 | +upstream_linux: released (5.8.7-1) |
39 | +esm-infra/xenial_linux: needs-triage |
40 | +trusty_linux: ignored (out of standard support) |
41 | +xenial_linux: ignored (out of standard support) |
42 | +bionic_linux: needs-triage |
43 | +focal_linux: needs-triage |
44 | +jammy_linux: not-affected (5.15.0-56.62) |
45 | +kinetic_linux: not-affected |
46 | +trusty/esm_linux: not-affected |
47 | +devel_linux: not-affected |
48 | + |
49 | +Patches_linux-hwe: |
50 | +upstream_linux-hwe: needs-triage |
51 | +esm-infra/xenial_linux-hwe: needs-triage |
52 | +trusty_linux-hwe: DNE |
53 | +xenial_linux-hwe: ignored (end of standard support) |
54 | +bionic_linux-hwe: ignored (replaced by linux-hwe-5.4) |
55 | +focal_linux-hwe: DNE |
56 | +jammy_linux-hwe: DNE |
57 | +kinetic_linux-hwe: DNE |
58 | + |
59 | +Patches_linux-hwe-5.4: |
60 | +upstream_linux-hwe-5.4: needs-triage |
61 | +trusty_linux-hwe-5.4: DNE |
62 | +xenial_linux-hwe-5.4: DNE |
63 | +bionic_linux-hwe-5.4: needs-triage |
64 | +focal_linux-hwe-5.4: DNE |
65 | +jammy_linux-hwe-5.4: DNE |
66 | +kinetic_linux-hwe-5.4: DNE |
67 | + |
68 | +Patches_linux-hwe-5.8: |
69 | +upstream_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11) |
70 | +trusty_linux-hwe-5.8: DNE |
71 | +xenial_linux-hwe-5.8: DNE |
72 | +bionic_linux-hwe-5.8: DNE |
73 | +focal_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11) |
74 | +jammy_linux-hwe-5.8: DNE |
75 | +kinetic_linux-hwe-5.8: DNE |
76 | + |
77 | +Patches_linux-hwe-5.11: |
78 | +upstream_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13) |
79 | +trusty_linux-hwe-5.11: DNE |
80 | +xenial_linux-hwe-5.11: DNE |
81 | +bionic_linux-hwe-5.11: DNE |
82 | +focal_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13) |
83 | +jammy_linux-hwe-5.11: DNE |
84 | +kinetic_linux-hwe-5.11: DNE |
85 | + |
86 | +Patches_linux-hwe-5.13: |
87 | +upstream_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15) |
88 | +trusty_linux-hwe-5.13: DNE |
89 | +xenial_linux-hwe-5.13: DNE |
90 | +bionic_linux-hwe-5.13: DNE |
91 | +focal_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15) |
92 | +jammy_linux-hwe-5.13: DNE |
93 | +kinetic_linux-hwe-5.13: DNE |
94 | + |
95 | +Patches_linux-hwe-5.15: |
96 | +upstream_linux-hwe-5.15: needs-triage |
97 | +trusty_linux-hwe-5.15: DNE |
98 | +xenial_linux-hwe-5.15: DNE |
99 | +bionic_linux-hwe-5.15: DNE |
100 | +focal_linux-hwe-5.15: needs-triage |
101 | +jammy_linux-hwe-5.15: DNE |
102 | +kinetic_linux-hwe-5.15: DNE |
103 | + |
104 | +Patches_linux-hwe-edge: |
105 | +upstream_linux-hwe-edge: needs-triage |
106 | +esm-infra/xenial_linux-hwe-edge: ignored (superseded by linux-hwe) |
107 | +trusty_linux-hwe-edge: DNE |
108 | +xenial_linux-hwe-edge: ignored (superseded by linux-hwe) |
109 | +bionic_linux-hwe-edge: ignored (superseded by linux-hwe-5.4) |
110 | +focal_linux-hwe-edge: DNE |
111 | +jammy_linux-hwe-edge: DNE |
112 | +kinetic_linux-hwe-edge: DNE |
113 | + |
114 | +Patches_linux-lts-xenial: |
115 | +upstream_linux-lts-xenial: needs-triage |
116 | +trusty_linux-lts-xenial: ignored (out of standard support) |
117 | +xenial_linux-lts-xenial: DNE |
118 | +bionic_linux-lts-xenial: DNE |
119 | +focal_linux-lts-xenial: DNE |
120 | +jammy_linux-lts-xenial: DNE |
121 | +kinetic_linux-lts-xenial: DNE |
122 | +trusty/esm_linux-lts-xenial: needs-triage |
123 | + |
124 | +Patches_linux-kvm: |
125 | +upstream_linux-kvm: needs-triage |
126 | +esm-infra/xenial_linux-kvm: needs-triage |
127 | +trusty_linux-kvm: DNE |
128 | +xenial_linux-kvm: ignored (end of standard support) |
129 | +bionic_linux-kvm: needs-triage |
130 | +focal_linux-kvm: needs-triage |
131 | +jammy_linux-kvm: needs-triage |
132 | +kinetic_linux-kvm: needs-triage |
133 | +devel_linux-kvm: needs-triage |
134 | + |
135 | +Patches_linux-aws: |
136 | +upstream_linux-aws: needs-triage |
137 | +esm-infra/xenial_linux-aws: needs-triage |
138 | +trusty_linux-aws: ignored (out of standard support) |
139 | +xenial_linux-aws: ignored (end of standard support) |
140 | +bionic_linux-aws: needs-triage |
141 | +focal_linux-aws: needs-triage |
142 | +jammy_linux-aws: needs-triage |
143 | +kinetic_linux-aws: needs-triage |
144 | +trusty/esm_linux-aws: needs-triage |
145 | +devel_linux-aws: needs-triage |
146 | + |
147 | +Patches_linux-aws-5.0: |
148 | +upstream_linux-aws-5.0: needs-triage |
149 | +trusty_linux-aws-5.0: DNE |
150 | +xenial_linux-aws-5.0: DNE |
151 | +bionic_linux-aws-5.0: ignored (superseded by linux-aws-5.3) |
152 | +focal_linux-aws-5.0: DNE |
153 | +jammy_linux-aws-5.0: DNE |
154 | +kinetic_linux-aws-5.0: DNE |
155 | + |
156 | +Patches_linux-aws-5.3: |
157 | +upstream_linux-aws-5.3: ignored (superseded by linux-aws-5.4) |
158 | +trusty_linux-aws-5.3: DNE |
159 | +xenial_linux-aws-5.3: DNE |
160 | +bionic_linux-aws-5.3: ignored (superseded by linux-aws-5.4) |
161 | +focal_linux-aws-5.3: DNE |
162 | +jammy_linux-aws-5.3: DNE |
163 | +kinetic_linux-aws-5.3: DNE |
164 | + |
165 | +Patches_linux-aws-5.4: |
166 | +upstream_linux-aws-5.4: needs-triage |
167 | +trusty_linux-aws-5.4: DNE |
168 | +xenial_linux-aws-5.4: DNE |
169 | +bionic_linux-aws-5.4: needs-triage |
170 | +focal_linux-aws-5.4: DNE |
171 | +jammy_linux-aws-5.4: DNE |
172 | +kinetic_linux-aws-5.4: DNE |
173 | + |
174 | +Patches_linux-aws-5.8: |
175 | +upstream_linux-aws-5.8: ignored (superseded by linux-aws-5.11) |
176 | +trusty_linux-aws-5.8: DNE |
177 | +xenial_linux-aws-5.8: DNE |
178 | +bionic_linux-aws-5.8: DNE |
179 | +focal_linux-aws-5.8: ignored (superseded by linux-aws-5.11) |
180 | +jammy_linux-aws-5.8: DNE |
181 | +kinetic_linux-aws-5.8: DNE |
182 | + |
183 | +Patches_linux-aws-5.11: |
184 | +upstream_linux-aws-5.11: ignored (superseded by linux-aws-5.13) |
185 | +trusty_linux-aws-5.11: DNE |
186 | +xenial_linux-aws-5.11: DNE |
187 | +bionic_linux-aws-5.11: DNE |
188 | +focal_linux-aws-5.11: ignored (superseded by linux-aws-5.13) |
189 | +jammy_linux-aws-5.11: DNE |
190 | +kinetic_linux-aws-5.11: DNE |
191 | + |
192 | +Patches_linux-aws-5.13: |
193 | +upstream_linux-aws-5.13: ignored (superseded by linux-aws-5.15) |
194 | +trusty_linux-aws-5.13: DNE |
195 | +xenial_linux-aws-5.13: DNE |
196 | +bionic_linux-aws-5.13: DNE |
197 | +focal_linux-aws-5.13: ignored (superseded by linux-aws-5.15) |
198 | +jammy_linux-aws-5.13: DNE |
199 | +kinetic_linux-aws-5.13: DNE |
200 | + |
201 | +Patches_linux-aws-5.15: |
202 | +upstream_linux-aws-5.15: needs-triage |
203 | +trusty_linux-aws-5.15: DNE |
204 | +xenial_linux-aws-5.15: DNE |
205 | +bionic_linux-aws-5.15: DNE |
206 | +focal_linux-aws-5.15: needs-triage |
207 | +jammy_linux-aws-5.15: DNE |
208 | +kinetic_linux-aws-5.15: DNE |
209 | + |
210 | +Patches_linux-aws-hwe: |
211 | +upstream_linux-aws-hwe: needs-triage |
212 | +esm-infra/xenial_linux-aws-hwe: needs-triage |
213 | +trusty_linux-aws-hwe: DNE |
214 | +xenial_linux-aws-hwe: ignored (end of standard support) |
215 | +bionic_linux-aws-hwe: DNE |
216 | +focal_linux-aws-hwe: DNE |
217 | +jammy_linux-aws-hwe: DNE |
218 | +kinetic_linux-aws-hwe: DNE |
219 | + |
220 | +Patches_linux-azure: |
221 | +upstream_linux-azure: needs-triage |
222 | +esm-infra/xenial_linux-azure: needs-triage |
223 | +trusty_linux-azure: ignored (out of standard support) |
224 | +xenial_linux-azure: ignored (end of standard support) |
225 | +bionic_linux-azure: ignored (superseded by linux-azure-5.3) |
226 | +focal_linux-azure: needs-triage |
227 | +jammy_linux-azure: needs-triage |
228 | +kinetic_linux-azure: needs-triage |
229 | +trusty/esm_linux-azure: needs-triage |
230 | +devel_linux-azure: needs-triage |
231 | + |
232 | +Patches_linux-azure-4.15: |
233 | +upstream_linux-azure-4.15: needs-triage |
234 | +trusty_linux-azure-4.15: DNE |
235 | +xenial_linux-azure-4.15: DNE |
236 | +bionic_linux-azure-4.15: needs-triage |
237 | +focal_linux-azure-4.15: DNE |
238 | +jammy_linux-azure-4.15: DNE |
239 | +kinetic_linux-azure-4.15: DNE |
240 | + |
241 | +Patches_linux-azure-5.3: |
242 | +upstream_linux-azure-5.3: ignored (superseded by linux-azure-5.4) |
243 | +trusty_linux-azure-5.3: DNE |
244 | +xenial_linux-azure-5.3: DNE |
245 | +bionic_linux-azure-5.3: ignored (superseded by linux-azure-5.4) |
246 | +focal_linux-azure-5.3: DNE |
247 | +jammy_linux-azure-5.3: DNE |
248 | +kinetic_linux-azure-5.3: DNE |
249 | + |
250 | +Patches_linux-azure-5.4: |
251 | +upstream_linux-azure-5.4: needs-triage |
252 | +trusty_linux-azure-5.4: DNE |
253 | +xenial_linux-azure-5.4: DNE |
254 | +bionic_linux-azure-5.4: needs-triage |
255 | +focal_linux-azure-5.4: DNE |
256 | +jammy_linux-azure-5.4: DNE |
257 | +kinetic_linux-azure-5.4: DNE |
258 | + |
259 | +Patches_linux-azure-5.8: |
260 | +upstream_linux-azure-5.8: ignored (superseded by linux-azure-5.11) |
261 | +trusty_linux-azure-5.8: DNE |
262 | +xenial_linux-azure-5.8: DNE |
263 | +bionic_linux-azure-5.8: DNE |
264 | +focal_linux-azure-5.8: ignored (superseded by linux-azure-5.11) |
265 | +jammy_linux-azure-5.8: DNE |
266 | +kinetic_linux-azure-5.8: DNE |
267 | + |
268 | +Patches_linux-azure-5.11: |
269 | +upstream_linux-azure-5.11: ignored (superseded by linux-azure-5.13) |
270 | +trusty_linux-azure-5.11: DNE |
271 | +xenial_linux-azure-5.11: DNE |
272 | +bionic_linux-azure-5.11: DNE |
273 | +focal_linux-azure-5.11: ignored (superseded by linux-azure-5.13) |
274 | +jammy_linux-azure-5.11: DNE |
275 | +kinetic_linux-azure-5.11: DNE |
276 | + |
277 | +Patches_linux-azure-5.13: |
278 | +upstream_linux-azure-5.13: ignored (superseded by linux-azure-5.15) |
279 | +trusty_linux-azure-5.13: DNE |
280 | +xenial_linux-azure-5.13: DNE |
281 | +bionic_linux-azure-5.13: DNE |
282 | +focal_linux-azure-5.13: ignored (superseded by linux-azure-5.15) |
283 | +jammy_linux-azure-5.13: DNE |
284 | +kinetic_linux-azure-5.13: DNE |
285 | + |
286 | +Patches_linux-azure-5.15: |
287 | +upstream_linux-azure-5.15: needs-triage |
288 | +trusty_linux-azure-5.15: DNE |
289 | +xenial_linux-azure-5.15: DNE |
290 | +bionic_linux-azure-5.15: DNE |
291 | +focal_linux-azure-5.15: needs-triage |
292 | +jammy_linux-azure-5.15: DNE |
293 | +kinetic_linux-azure-5.15: DNE |
294 | + |
295 | +Patches_linux-azure-fde: |
296 | +upstream_linux-azure-fde: needs-triage |
297 | +trusty_linux-azure-fde: DNE |
298 | +xenial_linux-azure-fde: DNE |
299 | +bionic_linux-azure-fde: DNE |
300 | +focal_linux-azure-fde: needs-triage |
301 | +jammy_linux-azure-fde: needs-triage |
302 | +kinetic_linux-azure-fde: DNE |
303 | + |
304 | +Patches_linux-azure-fde-5.15: |
305 | +upstream_linux-azure-fde-5.15: needs-triage |
306 | +trusty_linux-azure-fde-5.15: DNE |
307 | +xenial_linux-azure-fde-5.15: DNE |
308 | +bionic_linux-azure-fde-5.15: DNE |
309 | +focal_linux-azure-fde-5.15: needs-triage |
310 | +jammy_linux-azure-fde-5.15: DNE |
311 | +kinetic_linux-azure-fde-5.15: DNE |
312 | + |
313 | +Patches_linux-bluefield: |
314 | +upstream_linux-bluefield: needs-triage |
315 | +trusty_linux-bluefield: DNE |
316 | +xenial_linux-bluefield: DNE |
317 | +bionic_linux-bluefield: DNE |
318 | +focal_linux-bluefield: needs-triage |
319 | +jammy_linux-bluefield: DNE |
320 | +kinetic_linux-bluefield: DNE |
321 | + |
322 | +Patches_linux-dell300x: |
323 | +upstream_linux-dell300x: needs-triage |
324 | +trusty_linux-dell300x: DNE |
325 | +xenial_linux-dell300x: DNE |
326 | +bionic_linux-dell300x: needs-triage |
327 | +focal_linux-dell300x: DNE |
328 | +jammy_linux-dell300x: DNE |
329 | +kinetic_linux-dell300x: DNE |
330 | + |
331 | +Patches_linux-azure-edge: |
332 | +upstream_linux-azure-edge: needs-triage |
333 | +trusty_linux-azure-edge: DNE |
334 | +xenial_linux-azure-edge: DNE |
335 | +bionic_linux-azure-edge: ignored (superseded by linux-azure-5.3) |
336 | +focal_linux-azure-edge: DNE |
337 | +jammy_linux-azure-edge: DNE |
338 | +kinetic_linux-azure-edge: DNE |
339 | + |
340 | +Patches_linux-fips: |
341 | +upstream_linux-fips: needs-triage |
342 | +trusty_linux-fips: ignored (out of standard support) |
343 | +xenial_linux-fips: ignored (out of standard support) |
344 | +bionic_linux-fips: DNE |
345 | +focal_linux-fips: DNE |
346 | +jammy_linux-fips: DNE |
347 | +kinetic_linux-fips: DNE |
348 | +fips/xenial_linux-fips: needs-triage |
349 | +fips/bionic_linux-fips: needs-triage |
350 | +fips/focal_linux-fips: needs-triage |
351 | +fips-updates/xenial_linux-fips: needs-triage |
352 | +fips-updates/bionic_linux-fips: needs-triage |
353 | +fips-updates/focal_linux-fips: needs-triage |
354 | + |
355 | +Patches_linux-gcp: |
356 | +upstream_linux-gcp: needs-triage |
357 | +esm-infra/xenial_linux-gcp: needs-triage |
358 | +trusty_linux-gcp: DNE |
359 | +xenial_linux-gcp: ignored (end of standard support) |
360 | +bionic_linux-gcp: ignored (superseded by linux-gcp-5.3) |
361 | +focal_linux-gcp: needs-triage |
362 | +jammy_linux-gcp: needs-triage |
363 | +kinetic_linux-gcp: needs-triage |
364 | +devel_linux-gcp: needs-triage |
365 | + |
366 | +Patches_linux-gcp-4.15: |
367 | +upstream_linux-gcp-4.15: needs-triage |
368 | +trusty_linux-gcp-4.15: DNE |
369 | +xenial_linux-gcp-4.15: DNE |
370 | +bionic_linux-gcp-4.15: needs-triage |
371 | +focal_linux-gcp-4.15: DNE |
372 | +jammy_linux-gcp-4.15: DNE |
373 | +kinetic_linux-gcp-4.15: DNE |
374 | + |
375 | +Patches_linux-gcp-5.3: |
376 | +upstream_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4) |
377 | +trusty_linux-gcp-5.3: DNE |
378 | +xenial_linux-gcp-5.3: DNE |
379 | +bionic_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4) |
380 | +focal_linux-gcp-5.3: DNE |
381 | +jammy_linux-gcp-5.3: DNE |
382 | +kinetic_linux-gcp-5.3: DNE |
383 | + |
384 | +Patches_linux-gcp-5.4: |
385 | +upstream_linux-gcp-5.4: needs-triage |
386 | +trusty_linux-gcp-5.4: DNE |
387 | +xenial_linux-gcp-5.4: DNE |
388 | +bionic_linux-gcp-5.4: needs-triage |
389 | +focal_linux-gcp-5.4: DNE |
390 | +jammy_linux-gcp-5.4: DNE |
391 | +kinetic_linux-gcp-5.4: DNE |
392 | + |
393 | +Patches_linux-gcp-5.8: |
394 | +upstream_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11) |
395 | +trusty_linux-gcp-5.8: DNE |
396 | +xenial_linux-gcp-5.8: DNE |
397 | +bionic_linux-gcp-5.8: DNE |
398 | +focal_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11) |
399 | +jammy_linux-gcp-5.8: DNE |
400 | +kinetic_linux-gcp-5.8: DNE |
401 | + |
402 | +Patches_linux-gcp-5.11: |
403 | +upstream_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13) |
404 | +trusty_linux-gcp-5.11: DNE |
405 | +xenial_linux-gcp-5.11: DNE |
406 | +bionic_linux-gcp-5.11: DNE |
407 | +focal_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13) |
408 | +jammy_linux-gcp-5.11: DNE |
409 | +kinetic_linux-gcp-5.11: DNE |
410 | + |
411 | +Patches_linux-gcp-5.13: |
412 | +upstream_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15) |
413 | +trusty_linux-gcp-5.13: DNE |
414 | +xenial_linux-gcp-5.13: DNE |
415 | +bionic_linux-gcp-5.13: DNE |
416 | +focal_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15) |
417 | +jammy_linux-gcp-5.13: DNE |
418 | +kinetic_linux-gcp-5.13: DNE |
419 | + |
420 | +Patches_linux-gcp-5.15: |
421 | +upstream_linux-gcp-5.15: needs-triage |
422 | +trusty_linux-gcp-5.15: DNE |
423 | +xenial_linux-gcp-5.15: DNE |
424 | +bionic_linux-gcp-5.15: DNE |
425 | +focal_linux-gcp-5.15: needs-triage |
426 | +jammy_linux-gcp-5.15: DNE |
427 | +kinetic_linux-gcp-5.15: DNE |
428 | + |
429 | +Patches_linux-gke: |
430 | +upstream_linux-gke: needs-triage |
431 | +trusty_linux-gke: DNE |
432 | +xenial_linux-gke: ignored (reached end of standard support) |
433 | +bionic_linux-gke: DNE |
434 | +focal_linux-gke: needs-triage |
435 | +jammy_linux-gke: needs-triage |
436 | +kinetic_linux-gke: DNE |
437 | + |
438 | +Patches_linux-gke-4.15: |
439 | +upstream_linux-gke-4.15: needs-triage |
440 | +trusty_linux-gke-4.15: DNE |
441 | +xenial_linux-gke-4.15: DNE |
442 | +bionic_linux-gke-4.15: needs-triage |
443 | +focal_linux-gke-4.15: DNE |
444 | +jammy_linux-gke-4.15: DNE |
445 | +kinetic_linux-gke-4.15: DNE |
446 | + |
447 | +Patches_linux-gke-5.0: |
448 | +upstream_linux-gke-5.0: needs-triage |
449 | +trusty_linux-gke-5.0: DNE |
450 | +xenial_linux-gke-5.0: DNE |
451 | +bionic_linux-gke-5.0: ignored (superseded by linux-gke-5.3) |
452 | +focal_linux-gke-5.0: DNE |
453 | +jammy_linux-gke-5.0: DNE |
454 | +kinetic_linux-gke-5.0: DNE |
455 | + |
456 | +Patches_linux-gke-5.3: |
457 | +upstream_linux-gke-5.3: ignored (superseded by linux-gke-5.4) |
458 | +trusty_linux-gke-5.3: DNE |
459 | +xenial_linux-gke-5.3: DNE |
460 | +bionic_linux-gke-5.3: ignored (superseded by linux-gke-5.4) |
461 | +focal_linux-gke-5.3: DNE |
462 | +jammy_linux-gke-5.3: DNE |
463 | +kinetic_linux-gke-5.3: DNE |
464 | + |
465 | +Patches_linux-gke-5.4: |
466 | +upstream_linux-gke-5.4: needs-triage |
467 | +trusty_linux-gke-5.4: DNE |
468 | +xenial_linux-gke-5.4: DNE |
469 | +bionic_linux-gke-5.4: needs-triage |
470 | +focal_linux-gke-5.4: DNE |
471 | +jammy_linux-gke-5.4: DNE |
472 | +kinetic_linux-gke-5.4: DNE |
473 | + |
474 | +Patches_linux-gke-5.15: |
475 | +upstream_linux-gke-5.15: needs-triage |
476 | +trusty_linux-gke-5.15: DNE |
477 | +xenial_linux-gke-5.15: DNE |
478 | +bionic_linux-gke-5.15: DNE |
479 | +focal_linux-gke-5.15: needs-triage |
480 | +jammy_linux-gke-5.15: DNE |
481 | +kinetic_linux-gke-5.15: DNE |
482 | + |
483 | +Patches_linux-gkeop: |
484 | +upstream_linux-gkeop: needs-triage |
485 | +trusty_linux-gkeop: DNE |
486 | +xenial_linux-gkeop: DNE |
487 | +bionic_linux-gkeop: DNE |
488 | +focal_linux-gkeop: needs-triage |
489 | +jammy_linux-gkeop: needs-triage |
490 | +kinetic_linux-gkeop: DNE |
491 | + |
492 | +Patches_linux-gkeop-5.4: |
493 | +upstream_linux-gkeop-5.4: needs-triage |
494 | +trusty_linux-gkeop-5.4: DNE |
495 | +xenial_linux-gkeop-5.4: DNE |
496 | +bionic_linux-gkeop-5.4: needs-triage |
497 | +focal_linux-gkeop-5.4: DNE |
498 | +jammy_linux-gkeop-5.4: DNE |
499 | +kinetic_linux-gkeop-5.4: DNE |
500 | + |
501 | +Patches_linux-ibm: |
502 | +upstream_linux-ibm: needs-triage |
503 | +trusty_linux-ibm: DNE |
504 | +xenial_linux-ibm: DNE |
505 | +bionic_linux-ibm: DNE |
506 | +focal_linux-ibm: needs-triage |
507 | +jammy_linux-ibm: needs-triage |
508 | +kinetic_linux-ibm: needs-triage |
509 | +devel_linux-ibm: needs-triage |
510 | + |
511 | +Patches_linux-ibm-5.4: |
512 | +upstream_linux-ibm-5.4: needs-triage |
513 | +trusty_linux-ibm-5.4: DNE |
514 | +xenial_linux-ibm-5.4: DNE |
515 | +bionic_linux-ibm-5.4: needs-triage |
516 | +focal_linux-ibm-5.4: DNE |
517 | +jammy_linux-ibm-5.4: DNE |
518 | +kinetic_linux-ibm-5.4: DNE |
519 | + |
520 | +Patches_linux-intel-5.13: |
521 | +upstream_linux-intel-5.13: needs-triage |
522 | +trusty_linux-intel-5.13: DNE |
523 | +xenial_linux-intel-5.13: DNE |
524 | +bionic_linux-intel-5.13: DNE |
525 | +focal_linux-intel-5.13: needs-triage |
526 | +jammy_linux-intel-5.13: DNE |
527 | +kinetic_linux-intel-5.13: DNE |
528 | + |
529 | +Patches_linux-intel-iotg: |
530 | +upstream_linux-intel-iotg: needs-triage |
531 | +trusty_linux-intel-iotg: DNE |
532 | +xenial_linux-intel-iotg: DNE |
533 | +bionic_linux-intel-iotg: DNE |
534 | +focal_linux-intel-iotg: DNE |
535 | +jammy_linux-intel-iotg: needs-triage |
536 | +kinetic_linux-intel-iotg: DNE |
537 | + |
538 | +Patches_linux-intel-iotg-5.15: |
539 | +upstream_linux-intel-iotg-5.15: needs-triage |
540 | +trusty_linux-intel-iotg-5.15: DNE |
541 | +xenial_linux-intel-iotg-5.15: DNE |
542 | +bionic_linux-intel-iotg-5.15: DNE |
543 | +focal_linux-intel-iotg-5.15: needs-triage |
544 | +jammy_linux-intel-iotg-5.15: DNE |
545 | +kinetic_linux-intel-iotg-5.15: DNE |
546 | + |
547 | +Patches_linux-lowlatency: |
548 | +upstream_linux-lowlatency: needs-triage |
549 | +trusty_linux-lowlatency: DNE |
550 | +xenial_linux-lowlatency: DNE |
551 | +bionic_linux-lowlatency: DNE |
552 | +focal_linux-lowlatency: DNE |
553 | +jammy_linux-lowlatency: needs-triage |
554 | +kinetic_linux-lowlatency: needs-triage |
555 | +devel_linux-lowlatency: needs-triage |
556 | + |
557 | +Patches_linux-lowlatency-hwe-5.15: |
558 | +upstream_linux-lowlatency-hwe-5.15: needs-triage |
559 | +trusty_linux-lowlatency-hwe-5.15: DNE |
560 | +xenial_linux-lowlatency-hwe-5.15: DNE |
561 | +bionic_linux-lowlatency-hwe-5.15: DNE |
562 | +focal_linux-lowlatency-hwe-5.15: needs-triage |
563 | +jammy_linux-lowlatency-hwe-5.15: DNE |
564 | +kinetic_linux-lowlatency-hwe-5.15: DNE |
565 | + |
566 | +Patches_linux-oracle: |
567 | +upstream_linux-oracle: needs-triage |
568 | +esm-infra/xenial_linux-oracle: needs-triage |
569 | +trusty_linux-oracle: DNE |
570 | +xenial_linux-oracle: ignored (end of standard support) |
571 | +bionic_linux-oracle: needs-triage |
572 | +focal_linux-oracle: needs-triage |
573 | +jammy_linux-oracle: needs-triage |
574 | +kinetic_linux-oracle: needs-triage |
575 | +devel_linux-oracle: needs-triage |
576 | + |
577 | +Patches_linux-oracle-5.0: |
578 | +upstream_linux-oracle-5.0: needs-triage |
579 | +trusty_linux-oracle-5.0: DNE |
580 | +xenial_linux-oracle-5.0: DNE |
581 | +bionic_linux-oracle-5.0: ignored (superseded by linux-oracle-5.3) |
582 | +focal_linux-oracle-5.0: DNE |
583 | +jammy_linux-oracle-5.0: DNE |
584 | +kinetic_linux-oracle-5.0: DNE |
585 | + |
586 | +Patches_linux-oracle-5.3: |
587 | +upstream_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4) |
588 | +trusty_linux-oracle-5.3: DNE |
589 | +xenial_linux-oracle-5.3: DNE |
590 | +bionic_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4) |
591 | +focal_linux-oracle-5.3: DNE |
592 | +jammy_linux-oracle-5.3: DNE |
593 | +kinetic_linux-oracle-5.3: DNE |
594 | + |
595 | +Patches_linux-oracle-5.4: |
596 | +upstream_linux-oracle-5.4: needs-triage |
597 | +trusty_linux-oracle-5.4: DNE |
598 | +xenial_linux-oracle-5.4: DNE |
599 | +bionic_linux-oracle-5.4: needs-triage |
600 | +focal_linux-oracle-5.4: DNE |
601 | +jammy_linux-oracle-5.4: DNE |
602 | +kinetic_linux-oracle-5.4: DNE |
603 | + |
604 | +Patches_linux-oracle-5.8: |
605 | +upstream_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11) |
606 | +trusty_linux-oracle-5.8: DNE |
607 | +xenial_linux-oracle-5.8: DNE |
608 | +bionic_linux-oracle-5.8: DNE |
609 | +focal_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11) |
610 | +jammy_linux-oracle-5.8: DNE |
611 | +kinetic_linux-oracle-5.8: DNE |
612 | + |
613 | +Patches_linux-oracle-5.11: |
614 | +upstream_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13) |
615 | +trusty_linux-oracle-5.11: DNE |
616 | +xenial_linux-oracle-5.11: DNE |
617 | +bionic_linux-oracle-5.11: DNE |
618 | +focal_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13) |
619 | +jammy_linux-oracle-5.11: DNE |
620 | +kinetic_linux-oracle-5.11: DNE |
621 | + |
622 | +Patches_linux-oracle-5.13: |
623 | +upstream_linux-oracle-5.13: needs-triage |
624 | +trusty_linux-oracle-5.13: DNE |
625 | +xenial_linux-oracle-5.13: DNE |
626 | +bionic_linux-oracle-5.13: DNE |
627 | +focal_linux-oracle-5.13: needs-triage |
628 | +jammy_linux-oracle-5.13: DNE |
629 | +kinetic_linux-oracle-5.13: DNE |
630 | + |
631 | +Patches_linux-oracle-5.15: |
632 | +upstream_linux-oracle-5.15: needs-triage |
633 | +trusty_linux-oracle-5.15: DNE |
634 | +xenial_linux-oracle-5.15: DNE |
635 | +bionic_linux-oracle-5.15: DNE |
636 | +focal_linux-oracle-5.15: needs-triage |
637 | +jammy_linux-oracle-5.15: DNE |
638 | +kinetic_linux-oracle-5.15: DNE |
639 | + |
640 | +Patches_linux-oem: |
641 | +upstream_linux-oem: needs-triage |
642 | +trusty_linux-oem: DNE |
643 | +xenial_linux-oem: ignored (superseded by linux-hwe) |
644 | +bionic_linux-oem: needs-triage |
645 | +focal_linux-oem: DNE |
646 | +jammy_linux-oem: DNE |
647 | +kinetic_linux-oem: DNE |
648 | + |
649 | +Patches_linux-oem-5.6: |
650 | +upstream_linux-oem-5.6: needs-triage |
651 | +trusty_linux-oem-5.6: DNE |
652 | +xenial_linux-oem-5.6: DNE |
653 | +bionic_linux-oem-5.6: DNE |
654 | +focal_linux-oem-5.6: needs-triage |
655 | +jammy_linux-oem-5.6: DNE |
656 | +kinetic_linux-oem-5.6: DNE |
657 | + |
658 | +Patches_linux-oem-5.10: |
659 | +upstream_linux-oem-5.10: needs-triage |
660 | +trusty_linux-oem-5.10: DNE |
661 | +xenial_linux-oem-5.10: DNE |
662 | +bionic_linux-oem-5.10: DNE |
663 | +focal_linux-oem-5.10: needs-triage |
664 | +jammy_linux-oem-5.10: DNE |
665 | +kinetic_linux-oem-5.10: DNE |
666 | + |
667 | +Patches_linux-oem-5.13: |
668 | +upstream_linux-oem-5.13: ignored (superseded by linux-oem-5.14) |
669 | +trusty_linux-oem-5.13: DNE |
670 | +xenial_linux-oem-5.13: DNE |
671 | +bionic_linux-oem-5.13: DNE |
672 | +focal_linux-oem-5.13: ignored (superseded by linux-oem-5.14) |
673 | +jammy_linux-oem-5.13: DNE |
674 | +kinetic_linux-oem-5.13: DNE |
675 | + |
676 | +Patches_linux-oem-5.14: |
677 | +upstream_linux-oem-5.14: needs-triage |
678 | +trusty_linux-oem-5.14: DNE |
679 | +xenial_linux-oem-5.14: DNE |
680 | +bionic_linux-oem-5.14: DNE |
681 | +focal_linux-oem-5.14: needs-triage |
682 | +jammy_linux-oem-5.14: DNE |
683 | +kinetic_linux-oem-5.14: DNE |
684 | + |
685 | +Patches_linux-oem-5.17: |
686 | +upstream_linux-oem-5.17: needs-triage |
687 | +trusty_linux-oem-5.17: DNE |
688 | +xenial_linux-oem-5.17: DNE |
689 | +bionic_linux-oem-5.17: DNE |
690 | +focal_linux-oem-5.17: DNE |
691 | +jammy_linux-oem-5.17: needs-triage |
692 | +kinetic_linux-oem-5.17: needs-triage |
693 | +devel_linux-oem-5.17: needs-triage |
694 | + |
695 | +Patches_linux-oem-osp1: |
696 | +upstream_linux-oem-osp1: needs-triage |
697 | +trusty_linux-oem-osp1: DNE |
698 | +xenial_linux-oem-osp1: DNE |
699 | +bionic_linux-oem-osp1: needs-triage |
700 | +focal_linux-oem-osp1: DNE |
701 | +jammy_linux-oem-osp1: DNE |
702 | +kinetic_linux-oem-osp1: DNE |
703 | + |
704 | +Patches_linux-raspi: |
705 | +upstream_linux-raspi: needs-triage |
706 | +trusty_linux-raspi: DNE |
707 | +xenial_linux-raspi: DNE |
708 | +bionic_linux-raspi: DNE |
709 | +focal_linux-raspi: needs-triage |
710 | +jammy_linux-raspi: needs-triage |
711 | +kinetic_linux-raspi: needs-triage |
712 | +devel_linux-raspi: needs-triage |
713 | + |
714 | +Patches_linux-raspi2: |
715 | +upstream_linux-raspi2: needs-triage |
716 | +trusty_linux-raspi2: DNE |
717 | +xenial_linux-raspi2: ignored (end of standard support) |
718 | +bionic_linux-raspi2: needs-triage |
719 | +focal_linux-raspi2: ignored (replaced by linux-raspi) |
720 | +jammy_linux-raspi2: DNE |
721 | +kinetic_linux-raspi2: DNE |
722 | + |
723 | +Patches_linux-raspi2-5.3: |
724 | +upstream_linux-raspi2-5.3: ignored (superseded by linux-raspi2-5.4) |
725 | +trusty_linux-raspi2-5.3: DNE |
726 | +xenial_linux-raspi2-5.3: DNE |
727 | +bionic_linux-raspi2-5.3: ignored (superseded by linux-raspi-5.4) |
728 | +focal_linux-raspi2-5.3: DNE |
729 | +jammy_linux-raspi2-5.3: DNE |
730 | +kinetic_linux-raspi2-5.3: DNE |
731 | + |
732 | +Patches_linux-raspi-5.4: |
733 | +upstream_linux-raspi-5.4: needs-triage |
734 | +trusty_linux-raspi-5.4: DNE |
735 | +xenial_linux-raspi-5.4: DNE |
736 | +bionic_linux-raspi-5.4: needs-triage |
737 | +focal_linux-raspi-5.4: DNE |
738 | +jammy_linux-raspi-5.4: DNE |
739 | +kinetic_linux-raspi-5.4: DNE |
740 | + |
741 | +Patches_linux-riscv: |
742 | +upstream_linux-riscv: needs-triage |
743 | +trusty_linux-riscv: DNE |
744 | +xenial_linux-riscv: DNE |
745 | +bionic_linux-riscv: DNE |
746 | +focal_linux-riscv: ignored (superseded by linux-riscv-5.8) |
747 | +jammy_linux-riscv: needs-triage |
748 | +kinetic_linux-riscv: needs-triage |
749 | +devel_linux-riscv: needs-triage |
750 | + |
751 | +Patches_linux-riscv-5.8: |
752 | +upstream_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11) |
753 | +trusty_linux-riscv-5.8: DNE |
754 | +xenial_linux-riscv-5.8: DNE |
755 | +bionic_linux-riscv-5.8: DNE |
756 | +focal_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11) |
757 | +jammy_linux-riscv-5.8: DNE |
758 | +kinetic_linux-riscv-5.8: DNE |
759 | + |
760 | +Patches_linux-riscv-5.11: |
761 | +upstream_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13) |
762 | +trusty_linux-riscv-5.11: DNE |
763 | +xenial_linux-riscv-5.11: DNE |
764 | +bionic_linux-riscv-5.11: DNE |
765 | +focal_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13) |
766 | +jammy_linux-riscv-5.11: DNE |
767 | +kinetic_linux-riscv-5.11: DNE |
768 | + |
769 | +Patches_linux-snapdragon: |
770 | +upstream_linux-snapdragon: needs-triage |
771 | +trusty_linux-snapdragon: DNE |
772 | +xenial_linux-snapdragon: ignored (end of standard support) |
773 | +bionic_linux-snapdragon: needs-triage |
774 | +focal_linux-snapdragon: DNE |
775 | +jammy_linux-snapdragon: DNE |
776 | +kinetic_linux-snapdragon: DNE |
777 | diff --git a/active/CVE-2022-20566 b/active/CVE-2022-20566 |
778 | new file mode 100644 |
779 | index 0000000..5228ae3 |
780 | --- /dev/null |
781 | +++ b/active/CVE-2022-20566 |
782 | @@ -0,0 +1,757 @@ |
783 | +Candidate: CVE-2022-20566 |
784 | +PublicDate: 2022-12-06 |
785 | +References: |
786 | + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20566 |
787 | + https://git.kernel.org/linus/d0be8347c623e0ac4202a1d4e0373882821f56b0 |
788 | +Description: |
789 | + [Unknown description] |
790 | +Ubuntu-Description: |
791 | +Notes: |
792 | +Mitigation: |
793 | +Bugs: |
794 | +Priority: medium |
795 | +Discovered-by: |
796 | +Assigned-to: |
797 | +CVSS: |
798 | + |
799 | +Patches_linux: |
800 | + break-fix: - d0be8347c623e0ac4202a1d4e0373882821f56b0 |
801 | +upstream_linux: released (5.18.16-1) |
802 | +esm-infra/xenial_linux: needs-triage |
803 | +trusty_linux: ignored (out of standard support) |
804 | +xenial_linux: ignored (out of standard support) |
805 | +bionic_linux: needs-triage |
806 | +focal_linux: needs-triage |
807 | +jammy_linux: needs-triage |
808 | +kinetic_linux: not-affected (5.19.0-26.27) |
809 | +trusty/esm_linux: not-affected |
810 | +devel_linux: not-affected |
811 | + |
812 | +Patches_linux-hwe: |
813 | +upstream_linux-hwe: needs-triage |
814 | +esm-infra/xenial_linux-hwe: needs-triage |
815 | +trusty_linux-hwe: DNE |
816 | +xenial_linux-hwe: ignored (end of standard support) |
817 | +bionic_linux-hwe: ignored (replaced by linux-hwe-5.4) |
818 | +focal_linux-hwe: DNE |
819 | +jammy_linux-hwe: DNE |
820 | +kinetic_linux-hwe: DNE |
821 | + |
822 | +Patches_linux-hwe-5.4: |
823 | +upstream_linux-hwe-5.4: needs-triage |
824 | +trusty_linux-hwe-5.4: DNE |
825 | +xenial_linux-hwe-5.4: DNE |
826 | +bionic_linux-hwe-5.4: needs-triage |
827 | +focal_linux-hwe-5.4: DNE |
828 | +jammy_linux-hwe-5.4: DNE |
829 | +kinetic_linux-hwe-5.4: DNE |
830 | + |
831 | +Patches_linux-hwe-5.8: |
832 | +upstream_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11) |
833 | +trusty_linux-hwe-5.8: DNE |
834 | +xenial_linux-hwe-5.8: DNE |
835 | +bionic_linux-hwe-5.8: DNE |
836 | +focal_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11) |
837 | +jammy_linux-hwe-5.8: DNE |
838 | +kinetic_linux-hwe-5.8: DNE |
839 | + |
840 | +Patches_linux-hwe-5.11: |
841 | +upstream_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13) |
842 | +trusty_linux-hwe-5.11: DNE |
843 | +xenial_linux-hwe-5.11: DNE |
844 | +bionic_linux-hwe-5.11: DNE |
845 | +focal_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13) |
846 | +jammy_linux-hwe-5.11: DNE |
847 | +kinetic_linux-hwe-5.11: DNE |
848 | + |
849 | +Patches_linux-hwe-5.13: |
850 | +upstream_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15) |
851 | +trusty_linux-hwe-5.13: DNE |
852 | +xenial_linux-hwe-5.13: DNE |
853 | +bionic_linux-hwe-5.13: DNE |
854 | +focal_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15) |
855 | +jammy_linux-hwe-5.13: DNE |
856 | +kinetic_linux-hwe-5.13: DNE |
857 | + |
858 | +Patches_linux-hwe-5.15: |
859 | +upstream_linux-hwe-5.15: needs-triage |
860 | +trusty_linux-hwe-5.15: DNE |
861 | +xenial_linux-hwe-5.15: DNE |
862 | +bionic_linux-hwe-5.15: DNE |
863 | +focal_linux-hwe-5.15: needs-triage |
864 | +jammy_linux-hwe-5.15: DNE |
865 | +kinetic_linux-hwe-5.15: DNE |
866 | + |
867 | +Patches_linux-hwe-edge: |
868 | +upstream_linux-hwe-edge: needs-triage |
869 | +esm-infra/xenial_linux-hwe-edge: ignored (superseded by linux-hwe) |
870 | +trusty_linux-hwe-edge: DNE |
871 | +xenial_linux-hwe-edge: ignored (superseded by linux-hwe) |
872 | +bionic_linux-hwe-edge: ignored (superseded by linux-hwe-5.4) |
873 | +focal_linux-hwe-edge: DNE |
874 | +jammy_linux-hwe-edge: DNE |
875 | +kinetic_linux-hwe-edge: DNE |
876 | + |
877 | +Patches_linux-lts-xenial: |
878 | +upstream_linux-lts-xenial: needs-triage |
879 | +trusty_linux-lts-xenial: ignored (out of standard support) |
880 | +xenial_linux-lts-xenial: DNE |
881 | +bionic_linux-lts-xenial: DNE |
882 | +focal_linux-lts-xenial: DNE |
883 | +jammy_linux-lts-xenial: DNE |
884 | +kinetic_linux-lts-xenial: DNE |
885 | +trusty/esm_linux-lts-xenial: needs-triage |
886 | + |
887 | +Patches_linux-kvm: |
888 | +upstream_linux-kvm: needs-triage |
889 | +esm-infra/xenial_linux-kvm: needs-triage |
890 | +trusty_linux-kvm: DNE |
891 | +xenial_linux-kvm: ignored (end of standard support) |
892 | +bionic_linux-kvm: needs-triage |
893 | +focal_linux-kvm: needs-triage |
894 | +jammy_linux-kvm: needs-triage |
895 | +kinetic_linux-kvm: needs-triage |
896 | +devel_linux-kvm: needs-triage |
897 | + |
898 | +Patches_linux-aws: |
899 | +upstream_linux-aws: needs-triage |
900 | +esm-infra/xenial_linux-aws: needs-triage |
901 | +trusty_linux-aws: ignored (out of standard support) |
902 | +xenial_linux-aws: ignored (end of standard support) |
903 | +bionic_linux-aws: needs-triage |
904 | +focal_linux-aws: needs-triage |
905 | +jammy_linux-aws: needs-triage |
906 | +kinetic_linux-aws: needs-triage |
907 | +trusty/esm_linux-aws: needs-triage |
908 | +devel_linux-aws: needs-triage |
909 | + |
910 | +Patches_linux-aws-5.0: |
911 | +upstream_linux-aws-5.0: needs-triage |
912 | +trusty_linux-aws-5.0: DNE |
913 | +xenial_linux-aws-5.0: DNE |
914 | +bionic_linux-aws-5.0: ignored (superseded by linux-aws-5.3) |
915 | +focal_linux-aws-5.0: DNE |
916 | +jammy_linux-aws-5.0: DNE |
917 | +kinetic_linux-aws-5.0: DNE |
918 | + |
919 | +Patches_linux-aws-5.3: |
920 | +upstream_linux-aws-5.3: ignored (superseded by linux-aws-5.4) |
921 | +trusty_linux-aws-5.3: DNE |
922 | +xenial_linux-aws-5.3: DNE |
923 | +bionic_linux-aws-5.3: ignored (superseded by linux-aws-5.4) |
924 | +focal_linux-aws-5.3: DNE |
925 | +jammy_linux-aws-5.3: DNE |
926 | +kinetic_linux-aws-5.3: DNE |
927 | + |
928 | +Patches_linux-aws-5.4: |
929 | +upstream_linux-aws-5.4: needs-triage |
930 | +trusty_linux-aws-5.4: DNE |
931 | +xenial_linux-aws-5.4: DNE |
932 | +bionic_linux-aws-5.4: needs-triage |
933 | +focal_linux-aws-5.4: DNE |
934 | +jammy_linux-aws-5.4: DNE |
935 | +kinetic_linux-aws-5.4: DNE |
936 | + |
937 | +Patches_linux-aws-5.8: |
938 | +upstream_linux-aws-5.8: ignored (superseded by linux-aws-5.11) |
939 | +trusty_linux-aws-5.8: DNE |
940 | +xenial_linux-aws-5.8: DNE |
941 | +bionic_linux-aws-5.8: DNE |
942 | +focal_linux-aws-5.8: ignored (superseded by linux-aws-5.11) |
943 | +jammy_linux-aws-5.8: DNE |
944 | +kinetic_linux-aws-5.8: DNE |
945 | + |
946 | +Patches_linux-aws-5.11: |
947 | +upstream_linux-aws-5.11: ignored (superseded by linux-aws-5.13) |
948 | +trusty_linux-aws-5.11: DNE |
949 | +xenial_linux-aws-5.11: DNE |
950 | +bionic_linux-aws-5.11: DNE |
951 | +focal_linux-aws-5.11: ignored (superseded by linux-aws-5.13) |
952 | +jammy_linux-aws-5.11: DNE |
953 | +kinetic_linux-aws-5.11: DNE |
954 | + |
955 | +Patches_linux-aws-5.13: |
956 | +upstream_linux-aws-5.13: ignored (superseded by linux-aws-5.15) |
957 | +trusty_linux-aws-5.13: DNE |
958 | +xenial_linux-aws-5.13: DNE |
959 | +bionic_linux-aws-5.13: DNE |
960 | +focal_linux-aws-5.13: ignored (superseded by linux-aws-5.15) |
961 | +jammy_linux-aws-5.13: DNE |
962 | +kinetic_linux-aws-5.13: DNE |
963 | + |
964 | +Patches_linux-aws-5.15: |
965 | +upstream_linux-aws-5.15: needs-triage |
966 | +trusty_linux-aws-5.15: DNE |
967 | +xenial_linux-aws-5.15: DNE |
968 | +bionic_linux-aws-5.15: DNE |
969 | +focal_linux-aws-5.15: needs-triage |
970 | +jammy_linux-aws-5.15: DNE |
971 | +kinetic_linux-aws-5.15: DNE |
972 | + |
973 | +Patches_linux-aws-hwe: |
974 | +upstream_linux-aws-hwe: needs-triage |
975 | +esm-infra/xenial_linux-aws-hwe: needs-triage |
976 | +trusty_linux-aws-hwe: DNE |
977 | +xenial_linux-aws-hwe: ignored (end of standard support) |
978 | +bionic_linux-aws-hwe: DNE |
979 | +focal_linux-aws-hwe: DNE |
980 | +jammy_linux-aws-hwe: DNE |
981 | +kinetic_linux-aws-hwe: DNE |
982 | + |
983 | +Patches_linux-azure: |
984 | +upstream_linux-azure: needs-triage |
985 | +esm-infra/xenial_linux-azure: needs-triage |
986 | +trusty_linux-azure: ignored (out of standard support) |
987 | +xenial_linux-azure: ignored (end of standard support) |
988 | +bionic_linux-azure: ignored (superseded by linux-azure-5.3) |
989 | +focal_linux-azure: needs-triage |
990 | +jammy_linux-azure: needs-triage |
991 | +kinetic_linux-azure: needs-triage |
992 | +trusty/esm_linux-azure: needs-triage |
993 | +devel_linux-azure: needs-triage |
994 | + |
995 | +Patches_linux-azure-4.15: |
996 | +upstream_linux-azure-4.15: needs-triage |
997 | +trusty_linux-azure-4.15: DNE |
998 | +xenial_linux-azure-4.15: DNE |
999 | +bionic_linux-azure-4.15: needs-triage |
1000 | +focal_linux-azure-4.15: DNE |
1001 | +jammy_linux-azure-4.15: DNE |
1002 | +kinetic_linux-azure-4.15: DNE |
1003 | + |
1004 | +Patches_linux-azure-5.3: |
1005 | +upstream_linux-azure-5.3: ignored (superseded by linux-azure-5.4) |
1006 | +trusty_linux-azure-5.3: DNE |
1007 | +xenial_linux-azure-5.3: DNE |
1008 | +bionic_linux-azure-5.3: ignored (superseded by linux-azure-5.4) |
1009 | +focal_linux-azure-5.3: DNE |
1010 | +jammy_linux-azure-5.3: DNE |
1011 | +kinetic_linux-azure-5.3: DNE |
1012 | + |
1013 | +Patches_linux-azure-5.4: |
1014 | +upstream_linux-azure-5.4: needs-triage |
1015 | +trusty_linux-azure-5.4: DNE |
1016 | +xenial_linux-azure-5.4: DNE |
1017 | +bionic_linux-azure-5.4: needs-triage |
1018 | +focal_linux-azure-5.4: DNE |
1019 | +jammy_linux-azure-5.4: DNE |
1020 | +kinetic_linux-azure-5.4: DNE |
1021 | + |
1022 | +Patches_linux-azure-5.8: |
1023 | +upstream_linux-azure-5.8: ignored (superseded by linux-azure-5.11) |
1024 | +trusty_linux-azure-5.8: DNE |
1025 | +xenial_linux-azure-5.8: DNE |
1026 | +bionic_linux-azure-5.8: DNE |
1027 | +focal_linux-azure-5.8: ignored (superseded by linux-azure-5.11) |
1028 | +jammy_linux-azure-5.8: DNE |
1029 | +kinetic_linux-azure-5.8: DNE |
1030 | + |
1031 | +Patches_linux-azure-5.11: |
1032 | +upstream_linux-azure-5.11: ignored (superseded by linux-azure-5.13) |
1033 | +trusty_linux-azure-5.11: DNE |
1034 | +xenial_linux-azure-5.11: DNE |
1035 | +bionic_linux-azure-5.11: DNE |
1036 | +focal_linux-azure-5.11: ignored (superseded by linux-azure-5.13) |
1037 | +jammy_linux-azure-5.11: DNE |
1038 | +kinetic_linux-azure-5.11: DNE |
1039 | + |
1040 | +Patches_linux-azure-5.13: |
1041 | +upstream_linux-azure-5.13: ignored (superseded by linux-azure-5.15) |
1042 | +trusty_linux-azure-5.13: DNE |
1043 | +xenial_linux-azure-5.13: DNE |
1044 | +bionic_linux-azure-5.13: DNE |
1045 | +focal_linux-azure-5.13: ignored (superseded by linux-azure-5.15) |
1046 | +jammy_linux-azure-5.13: DNE |
1047 | +kinetic_linux-azure-5.13: DNE |
1048 | + |
1049 | +Patches_linux-azure-5.15: |
1050 | +upstream_linux-azure-5.15: needs-triage |
1051 | +trusty_linux-azure-5.15: DNE |
1052 | +xenial_linux-azure-5.15: DNE |
1053 | +bionic_linux-azure-5.15: DNE |
1054 | +focal_linux-azure-5.15: needs-triage |
1055 | +jammy_linux-azure-5.15: DNE |
1056 | +kinetic_linux-azure-5.15: DNE |
1057 | + |
1058 | +Patches_linux-azure-fde: |
1059 | +upstream_linux-azure-fde: needs-triage |
1060 | +trusty_linux-azure-fde: DNE |
1061 | +xenial_linux-azure-fde: DNE |
1062 | +bionic_linux-azure-fde: DNE |
1063 | +focal_linux-azure-fde: needs-triage |
1064 | +jammy_linux-azure-fde: needs-triage |
1065 | +kinetic_linux-azure-fde: DNE |
1066 | + |
1067 | +Patches_linux-azure-fde-5.15: |
1068 | +upstream_linux-azure-fde-5.15: needs-triage |
1069 | +trusty_linux-azure-fde-5.15: DNE |
1070 | +xenial_linux-azure-fde-5.15: DNE |
1071 | +bionic_linux-azure-fde-5.15: DNE |
1072 | +focal_linux-azure-fde-5.15: needs-triage |
1073 | +jammy_linux-azure-fde-5.15: DNE |
1074 | +kinetic_linux-azure-fde-5.15: DNE |
1075 | + |
1076 | +Patches_linux-bluefield: |
1077 | +upstream_linux-bluefield: needs-triage |
1078 | +trusty_linux-bluefield: DNE |
1079 | +xenial_linux-bluefield: DNE |
1080 | +bionic_linux-bluefield: DNE |
1081 | +focal_linux-bluefield: needs-triage |
1082 | +jammy_linux-bluefield: DNE |
1083 | +kinetic_linux-bluefield: DNE |
1084 | + |
1085 | +Patches_linux-dell300x: |
1086 | +upstream_linux-dell300x: needs-triage |
1087 | +trusty_linux-dell300x: DNE |
1088 | +xenial_linux-dell300x: DNE |
1089 | +bionic_linux-dell300x: needs-triage |
1090 | +focal_linux-dell300x: DNE |
1091 | +jammy_linux-dell300x: DNE |
1092 | +kinetic_linux-dell300x: DNE |
1093 | + |
1094 | +Patches_linux-azure-edge: |
1095 | +upstream_linux-azure-edge: needs-triage |
1096 | +trusty_linux-azure-edge: DNE |
1097 | +xenial_linux-azure-edge: DNE |
1098 | +bionic_linux-azure-edge: ignored (superseded by linux-azure-5.3) |
1099 | +focal_linux-azure-edge: DNE |
1100 | +jammy_linux-azure-edge: DNE |
1101 | +kinetic_linux-azure-edge: DNE |
1102 | + |
1103 | +Patches_linux-fips: |
1104 | +upstream_linux-fips: needs-triage |
1105 | +trusty_linux-fips: ignored (out of standard support) |
1106 | +xenial_linux-fips: ignored (out of standard support) |
1107 | +bionic_linux-fips: DNE |
1108 | +focal_linux-fips: DNE |
1109 | +jammy_linux-fips: DNE |
1110 | +kinetic_linux-fips: DNE |
1111 | +fips/xenial_linux-fips: needs-triage |
1112 | +fips/bionic_linux-fips: needs-triage |
1113 | +fips/focal_linux-fips: needs-triage |
1114 | +fips-updates/xenial_linux-fips: needs-triage |
1115 | +fips-updates/bionic_linux-fips: needs-triage |
1116 | +fips-updates/focal_linux-fips: needs-triage |
1117 | + |
1118 | +Patches_linux-gcp: |
1119 | +upstream_linux-gcp: needs-triage |
1120 | +esm-infra/xenial_linux-gcp: needs-triage |
1121 | +trusty_linux-gcp: DNE |
1122 | +xenial_linux-gcp: ignored (end of standard support) |
1123 | +bionic_linux-gcp: ignored (superseded by linux-gcp-5.3) |
1124 | +focal_linux-gcp: needs-triage |
1125 | +jammy_linux-gcp: needs-triage |
1126 | +kinetic_linux-gcp: needs-triage |
1127 | +devel_linux-gcp: needs-triage |
1128 | + |
1129 | +Patches_linux-gcp-4.15: |
1130 | +upstream_linux-gcp-4.15: needs-triage |
1131 | +trusty_linux-gcp-4.15: DNE |
1132 | +xenial_linux-gcp-4.15: DNE |
1133 | +bionic_linux-gcp-4.15: needs-triage |
1134 | +focal_linux-gcp-4.15: DNE |
1135 | +jammy_linux-gcp-4.15: DNE |
1136 | +kinetic_linux-gcp-4.15: DNE |
1137 | + |
1138 | +Patches_linux-gcp-5.3: |
1139 | +upstream_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4) |
1140 | +trusty_linux-gcp-5.3: DNE |
1141 | +xenial_linux-gcp-5.3: DNE |
1142 | +bionic_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4) |
1143 | +focal_linux-gcp-5.3: DNE |
1144 | +jammy_linux-gcp-5.3: DNE |
1145 | +kinetic_linux-gcp-5.3: DNE |
1146 | + |
1147 | +Patches_linux-gcp-5.4: |
1148 | +upstream_linux-gcp-5.4: needs-triage |
1149 | +trusty_linux-gcp-5.4: DNE |
1150 | +xenial_linux-gcp-5.4: DNE |
1151 | +bionic_linux-gcp-5.4: needs-triage |
1152 | +focal_linux-gcp-5.4: DNE |
1153 | +jammy_linux-gcp-5.4: DNE |
1154 | +kinetic_linux-gcp-5.4: DNE |
1155 | + |
1156 | +Patches_linux-gcp-5.8: |
1157 | +upstream_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11) |
1158 | +trusty_linux-gcp-5.8: DNE |
1159 | +xenial_linux-gcp-5.8: DNE |
1160 | +bionic_linux-gcp-5.8: DNE |
1161 | +focal_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11) |
1162 | +jammy_linux-gcp-5.8: DNE |
1163 | +kinetic_linux-gcp-5.8: DNE |
1164 | + |
1165 | +Patches_linux-gcp-5.11: |
1166 | +upstream_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13) |
1167 | +trusty_linux-gcp-5.11: DNE |
1168 | +xenial_linux-gcp-5.11: DNE |
1169 | +bionic_linux-gcp-5.11: DNE |
1170 | +focal_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13) |
1171 | +jammy_linux-gcp-5.11: DNE |
1172 | +kinetic_linux-gcp-5.11: DNE |
1173 | + |
1174 | +Patches_linux-gcp-5.13: |
1175 | +upstream_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15) |
1176 | +trusty_linux-gcp-5.13: DNE |
1177 | +xenial_linux-gcp-5.13: DNE |
1178 | +bionic_linux-gcp-5.13: DNE |
1179 | +focal_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15) |
1180 | +jammy_linux-gcp-5.13: DNE |
1181 | +kinetic_linux-gcp-5.13: DNE |
1182 | + |
1183 | +Patches_linux-gcp-5.15: |
1184 | +upstream_linux-gcp-5.15: needs-triage |
1185 | +trusty_linux-gcp-5.15: DNE |
1186 | +xenial_linux-gcp-5.15: DNE |
1187 | +bionic_linux-gcp-5.15: DNE |
1188 | +focal_linux-gcp-5.15: needs-triage |
1189 | +jammy_linux-gcp-5.15: DNE |
1190 | +kinetic_linux-gcp-5.15: DNE |
1191 | + |
1192 | +Patches_linux-gke: |
1193 | +upstream_linux-gke: needs-triage |
1194 | +trusty_linux-gke: DNE |
1195 | +xenial_linux-gke: ignored (reached end of standard support) |
1196 | +bionic_linux-gke: DNE |
1197 | +focal_linux-gke: needs-triage |
1198 | +jammy_linux-gke: needs-triage |
1199 | +kinetic_linux-gke: DNE |
1200 | + |
1201 | +Patches_linux-gke-4.15: |
1202 | +upstream_linux-gke-4.15: needs-triage |
1203 | +trusty_linux-gke-4.15: DNE |
1204 | +xenial_linux-gke-4.15: DNE |
1205 | +bionic_linux-gke-4.15: needs-triage |
1206 | +focal_linux-gke-4.15: DNE |
1207 | +jammy_linux-gke-4.15: DNE |
1208 | +kinetic_linux-gke-4.15: DNE |
1209 | + |
1210 | +Patches_linux-gke-5.0: |
1211 | +upstream_linux-gke-5.0: needs-triage |
1212 | +trusty_linux-gke-5.0: DNE |
1213 | +xenial_linux-gke-5.0: DNE |
1214 | +bionic_linux-gke-5.0: ignored (superseded by linux-gke-5.3) |
1215 | +focal_linux-gke-5.0: DNE |
1216 | +jammy_linux-gke-5.0: DNE |
1217 | +kinetic_linux-gke-5.0: DNE |
1218 | + |
1219 | +Patches_linux-gke-5.3: |
1220 | +upstream_linux-gke-5.3: ignored (superseded by linux-gke-5.4) |
1221 | +trusty_linux-gke-5.3: DNE |
1222 | +xenial_linux-gke-5.3: DNE |
1223 | +bionic_linux-gke-5.3: ignored (superseded by linux-gke-5.4) |
1224 | +focal_linux-gke-5.3: DNE |
1225 | +jammy_linux-gke-5.3: DNE |
1226 | +kinetic_linux-gke-5.3: DNE |
1227 | + |
1228 | +Patches_linux-gke-5.4: |
1229 | +upstream_linux-gke-5.4: needs-triage |
1230 | +trusty_linux-gke-5.4: DNE |
1231 | +xenial_linux-gke-5.4: DNE |
1232 | +bionic_linux-gke-5.4: needs-triage |
1233 | +focal_linux-gke-5.4: DNE |
1234 | +jammy_linux-gke-5.4: DNE |
1235 | +kinetic_linux-gke-5.4: DNE |
1236 | + |
1237 | +Patches_linux-gke-5.15: |
1238 | +upstream_linux-gke-5.15: needs-triage |
1239 | +trusty_linux-gke-5.15: DNE |
1240 | +xenial_linux-gke-5.15: DNE |
1241 | +bionic_linux-gke-5.15: DNE |
1242 | +focal_linux-gke-5.15: needs-triage |
1243 | +jammy_linux-gke-5.15: DNE |
1244 | +kinetic_linux-gke-5.15: DNE |
1245 | + |
1246 | +Patches_linux-gkeop: |
1247 | +upstream_linux-gkeop: needs-triage |
1248 | +trusty_linux-gkeop: DNE |
1249 | +xenial_linux-gkeop: DNE |
1250 | +bionic_linux-gkeop: DNE |
1251 | +focal_linux-gkeop: needs-triage |
1252 | +jammy_linux-gkeop: needs-triage |
1253 | +kinetic_linux-gkeop: DNE |
1254 | + |
1255 | +Patches_linux-gkeop-5.4: |
1256 | +upstream_linux-gkeop-5.4: needs-triage |
1257 | +trusty_linux-gkeop-5.4: DNE |
1258 | +xenial_linux-gkeop-5.4: DNE |
1259 | +bionic_linux-gkeop-5.4: needs-triage |
1260 | +focal_linux-gkeop-5.4: DNE |
1261 | +jammy_linux-gkeop-5.4: DNE |
1262 | +kinetic_linux-gkeop-5.4: DNE |
1263 | + |
1264 | +Patches_linux-ibm: |
1265 | +upstream_linux-ibm: needs-triage |
1266 | +trusty_linux-ibm: DNE |
1267 | +xenial_linux-ibm: DNE |
1268 | +bionic_linux-ibm: DNE |
1269 | +focal_linux-ibm: needs-triage |
1270 | +jammy_linux-ibm: needs-triage |
1271 | +kinetic_linux-ibm: needs-triage |
1272 | +devel_linux-ibm: needs-triage |
1273 | + |
1274 | +Patches_linux-ibm-5.4: |
1275 | +upstream_linux-ibm-5.4: needs-triage |
1276 | +trusty_linux-ibm-5.4: DNE |
1277 | +xenial_linux-ibm-5.4: DNE |
1278 | +bionic_linux-ibm-5.4: needs-triage |
1279 | +focal_linux-ibm-5.4: DNE |
1280 | +jammy_linux-ibm-5.4: DNE |
1281 | +kinetic_linux-ibm-5.4: DNE |
1282 | + |
1283 | +Patches_linux-intel-5.13: |
1284 | +upstream_linux-intel-5.13: needs-triage |
1285 | +trusty_linux-intel-5.13: DNE |
1286 | +xenial_linux-intel-5.13: DNE |
1287 | +bionic_linux-intel-5.13: DNE |
1288 | +focal_linux-intel-5.13: needs-triage |
1289 | +jammy_linux-intel-5.13: DNE |
1290 | +kinetic_linux-intel-5.13: DNE |
1291 | + |
1292 | +Patches_linux-intel-iotg: |
1293 | +upstream_linux-intel-iotg: needs-triage |
1294 | +trusty_linux-intel-iotg: DNE |
1295 | +xenial_linux-intel-iotg: DNE |
1296 | +bionic_linux-intel-iotg: DNE |
1297 | +focal_linux-intel-iotg: DNE |
1298 | +jammy_linux-intel-iotg: needs-triage |
1299 | +kinetic_linux-intel-iotg: DNE |
1300 | + |
1301 | +Patches_linux-intel-iotg-5.15: |
1302 | +upstream_linux-intel-iotg-5.15: needs-triage |
1303 | +trusty_linux-intel-iotg-5.15: DNE |
1304 | +xenial_linux-intel-iotg-5.15: DNE |
1305 | +bionic_linux-intel-iotg-5.15: DNE |
1306 | +focal_linux-intel-iotg-5.15: needs-triage |
1307 | +jammy_linux-intel-iotg-5.15: DNE |
1308 | +kinetic_linux-intel-iotg-5.15: DNE |
1309 | + |
1310 | +Patches_linux-lowlatency: |
1311 | +upstream_linux-lowlatency: needs-triage |
1312 | +trusty_linux-lowlatency: DNE |
1313 | +xenial_linux-lowlatency: DNE |
1314 | +bionic_linux-lowlatency: DNE |
1315 | +focal_linux-lowlatency: DNE |
1316 | +jammy_linux-lowlatency: needs-triage |
1317 | +kinetic_linux-lowlatency: needs-triage |
1318 | +devel_linux-lowlatency: needs-triage |
1319 | + |
1320 | +Patches_linux-lowlatency-hwe-5.15: |
1321 | +upstream_linux-lowlatency-hwe-5.15: needs-triage |
1322 | +trusty_linux-lowlatency-hwe-5.15: DNE |
1323 | +xenial_linux-lowlatency-hwe-5.15: DNE |
1324 | +bionic_linux-lowlatency-hwe-5.15: DNE |
1325 | +focal_linux-lowlatency-hwe-5.15: needs-triage |
1326 | +jammy_linux-lowlatency-hwe-5.15: DNE |
1327 | +kinetic_linux-lowlatency-hwe-5.15: DNE |
1328 | + |
1329 | +Patches_linux-oracle: |
1330 | +upstream_linux-oracle: needs-triage |
1331 | +esm-infra/xenial_linux-oracle: needs-triage |
1332 | +trusty_linux-oracle: DNE |
1333 | +xenial_linux-oracle: ignored (end of standard support) |
1334 | +bionic_linux-oracle: needs-triage |
1335 | +focal_linux-oracle: needs-triage |
1336 | +jammy_linux-oracle: needs-triage |
1337 | +kinetic_linux-oracle: needs-triage |
1338 | +devel_linux-oracle: needs-triage |
1339 | + |
1340 | +Patches_linux-oracle-5.0: |
1341 | +upstream_linux-oracle-5.0: needs-triage |
1342 | +trusty_linux-oracle-5.0: DNE |
1343 | +xenial_linux-oracle-5.0: DNE |
1344 | +bionic_linux-oracle-5.0: ignored (superseded by linux-oracle-5.3) |
1345 | +focal_linux-oracle-5.0: DNE |
1346 | +jammy_linux-oracle-5.0: DNE |
1347 | +kinetic_linux-oracle-5.0: DNE |
1348 | + |
1349 | +Patches_linux-oracle-5.3: |
1350 | +upstream_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4) |
1351 | +trusty_linux-oracle-5.3: DNE |
1352 | +xenial_linux-oracle-5.3: DNE |
1353 | +bionic_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4) |
1354 | +focal_linux-oracle-5.3: DNE |
1355 | +jammy_linux-oracle-5.3: DNE |
1356 | +kinetic_linux-oracle-5.3: DNE |
1357 | + |
1358 | +Patches_linux-oracle-5.4: |
1359 | +upstream_linux-oracle-5.4: needs-triage |
1360 | +trusty_linux-oracle-5.4: DNE |
1361 | +xenial_linux-oracle-5.4: DNE |
1362 | +bionic_linux-oracle-5.4: needs-triage |
1363 | +focal_linux-oracle-5.4: DNE |
1364 | +jammy_linux-oracle-5.4: DNE |
1365 | +kinetic_linux-oracle-5.4: DNE |
1366 | + |
1367 | +Patches_linux-oracle-5.8: |
1368 | +upstream_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11) |
1369 | +trusty_linux-oracle-5.8: DNE |
1370 | +xenial_linux-oracle-5.8: DNE |
1371 | +bionic_linux-oracle-5.8: DNE |
1372 | +focal_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11) |
1373 | +jammy_linux-oracle-5.8: DNE |
1374 | +kinetic_linux-oracle-5.8: DNE |
1375 | + |
1376 | +Patches_linux-oracle-5.11: |
1377 | +upstream_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13) |
1378 | +trusty_linux-oracle-5.11: DNE |
1379 | +xenial_linux-oracle-5.11: DNE |
1380 | +bionic_linux-oracle-5.11: DNE |
1381 | +focal_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13) |
1382 | +jammy_linux-oracle-5.11: DNE |
1383 | +kinetic_linux-oracle-5.11: DNE |
1384 | + |
1385 | +Patches_linux-oracle-5.13: |
1386 | +upstream_linux-oracle-5.13: needs-triage |
1387 | +trusty_linux-oracle-5.13: DNE |
1388 | +xenial_linux-oracle-5.13: DNE |
1389 | +bionic_linux-oracle-5.13: DNE |
1390 | +focal_linux-oracle-5.13: needs-triage |
1391 | +jammy_linux-oracle-5.13: DNE |
1392 | +kinetic_linux-oracle-5.13: DNE |
1393 | + |
1394 | +Patches_linux-oracle-5.15: |
1395 | +upstream_linux-oracle-5.15: needs-triage |
1396 | +trusty_linux-oracle-5.15: DNE |
1397 | +xenial_linux-oracle-5.15: DNE |
1398 | +bionic_linux-oracle-5.15: DNE |
1399 | +focal_linux-oracle-5.15: needs-triage |
1400 | +jammy_linux-oracle-5.15: DNE |
1401 | +kinetic_linux-oracle-5.15: DNE |
1402 | + |
1403 | +Patches_linux-oem: |
1404 | +upstream_linux-oem: needs-triage |
1405 | +trusty_linux-oem: DNE |
1406 | +xenial_linux-oem: ignored (superseded by linux-hwe) |
1407 | +bionic_linux-oem: needs-triage |
1408 | +focal_linux-oem: DNE |
1409 | +jammy_linux-oem: DNE |
1410 | +kinetic_linux-oem: DNE |
1411 | + |
1412 | +Patches_linux-oem-5.6: |
1413 | +upstream_linux-oem-5.6: needs-triage |
1414 | +trusty_linux-oem-5.6: DNE |
1415 | +xenial_linux-oem-5.6: DNE |
1416 | +bionic_linux-oem-5.6: DNE |
1417 | +focal_linux-oem-5.6: needs-triage |
1418 | +jammy_linux-oem-5.6: DNE |
1419 | +kinetic_linux-oem-5.6: DNE |
1420 | + |
1421 | +Patches_linux-oem-5.10: |
1422 | +upstream_linux-oem-5.10: needs-triage |
1423 | +trusty_linux-oem-5.10: DNE |
1424 | +xenial_linux-oem-5.10: DNE |
1425 | +bionic_linux-oem-5.10: DNE |
1426 | +focal_linux-oem-5.10: needs-triage |
1427 | +jammy_linux-oem-5.10: DNE |
1428 | +kinetic_linux-oem-5.10: DNE |
1429 | + |
1430 | +Patches_linux-oem-5.13: |
1431 | +upstream_linux-oem-5.13: ignored (superseded by linux-oem-5.14) |
1432 | +trusty_linux-oem-5.13: DNE |
1433 | +xenial_linux-oem-5.13: DNE |
1434 | +bionic_linux-oem-5.13: DNE |
1435 | +focal_linux-oem-5.13: ignored (superseded by linux-oem-5.14) |
1436 | +jammy_linux-oem-5.13: DNE |
1437 | +kinetic_linux-oem-5.13: DNE |
1438 | + |
1439 | +Patches_linux-oem-5.14: |
1440 | +upstream_linux-oem-5.14: needs-triage |
1441 | +trusty_linux-oem-5.14: DNE |
1442 | +xenial_linux-oem-5.14: DNE |
1443 | +bionic_linux-oem-5.14: DNE |
1444 | +focal_linux-oem-5.14: needs-triage |
1445 | +jammy_linux-oem-5.14: DNE |
1446 | +kinetic_linux-oem-5.14: DNE |
1447 | + |
1448 | +Patches_linux-oem-5.17: |
1449 | +upstream_linux-oem-5.17: needs-triage |
1450 | +trusty_linux-oem-5.17: DNE |
1451 | +xenial_linux-oem-5.17: DNE |
1452 | +bionic_linux-oem-5.17: DNE |
1453 | +focal_linux-oem-5.17: DNE |
1454 | +jammy_linux-oem-5.17: needs-triage |
1455 | +kinetic_linux-oem-5.17: needs-triage |
1456 | +devel_linux-oem-5.17: needs-triage |
1457 | + |
1458 | +Patches_linux-oem-osp1: |
1459 | +upstream_linux-oem-osp1: needs-triage |
1460 | +trusty_linux-oem-osp1: DNE |
1461 | +xenial_linux-oem-osp1: DNE |
1462 | +bionic_linux-oem-osp1: needs-triage |
1463 | +focal_linux-oem-osp1: DNE |
1464 | +jammy_linux-oem-osp1: DNE |
1465 | +kinetic_linux-oem-osp1: DNE |
1466 | + |
1467 | +Patches_linux-raspi: |
1468 | +upstream_linux-raspi: needs-triage |
1469 | +trusty_linux-raspi: DNE |
1470 | +xenial_linux-raspi: DNE |
1471 | +bionic_linux-raspi: DNE |
1472 | +focal_linux-raspi: needs-triage |
1473 | +jammy_linux-raspi: needs-triage |
1474 | +kinetic_linux-raspi: needs-triage |
1475 | +devel_linux-raspi: needs-triage |
1476 | + |
1477 | +Patches_linux-raspi2: |
1478 | +upstream_linux-raspi2: needs-triage |
1479 | +trusty_linux-raspi2: DNE |
1480 | +xenial_linux-raspi2: ignored (end of standard support) |
1481 | +bionic_linux-raspi2: needs-triage |
1482 | +focal_linux-raspi2: ignored (replaced by linux-raspi) |
1483 | +jammy_linux-raspi2: DNE |
1484 | +kinetic_linux-raspi2: DNE |
1485 | + |
1486 | +Patches_linux-raspi2-5.3: |
1487 | +upstream_linux-raspi2-5.3: ignored (superseded by linux-raspi2-5.4) |
1488 | +trusty_linux-raspi2-5.3: DNE |
1489 | +xenial_linux-raspi2-5.3: DNE |
1490 | +bionic_linux-raspi2-5.3: ignored (superseded by linux-raspi-5.4) |
1491 | +focal_linux-raspi2-5.3: DNE |
1492 | +jammy_linux-raspi2-5.3: DNE |
1493 | +kinetic_linux-raspi2-5.3: DNE |
1494 | + |
1495 | +Patches_linux-raspi-5.4: |
1496 | +upstream_linux-raspi-5.4: needs-triage |
1497 | +trusty_linux-raspi-5.4: DNE |
1498 | +xenial_linux-raspi-5.4: DNE |
1499 | +bionic_linux-raspi-5.4: needs-triage |
1500 | +focal_linux-raspi-5.4: DNE |
1501 | +jammy_linux-raspi-5.4: DNE |
1502 | +kinetic_linux-raspi-5.4: DNE |
1503 | + |
1504 | +Patches_linux-riscv: |
1505 | +upstream_linux-riscv: needs-triage |
1506 | +trusty_linux-riscv: DNE |
1507 | +xenial_linux-riscv: DNE |
1508 | +bionic_linux-riscv: DNE |
1509 | +focal_linux-riscv: ignored (superseded by linux-riscv-5.8) |
1510 | +jammy_linux-riscv: needs-triage |
1511 | +kinetic_linux-riscv: needs-triage |
1512 | +devel_linux-riscv: needs-triage |
1513 | + |
1514 | +Patches_linux-riscv-5.8: |
1515 | +upstream_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11) |
1516 | +trusty_linux-riscv-5.8: DNE |
1517 | +xenial_linux-riscv-5.8: DNE |
1518 | +bionic_linux-riscv-5.8: DNE |
1519 | +focal_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11) |
1520 | +jammy_linux-riscv-5.8: DNE |
1521 | +kinetic_linux-riscv-5.8: DNE |
1522 | + |
1523 | +Patches_linux-riscv-5.11: |
1524 | +upstream_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13) |
1525 | +trusty_linux-riscv-5.11: DNE |
1526 | +xenial_linux-riscv-5.11: DNE |
1527 | +bionic_linux-riscv-5.11: DNE |
1528 | +focal_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13) |
1529 | +jammy_linux-riscv-5.11: DNE |
1530 | +kinetic_linux-riscv-5.11: DNE |
1531 | + |
1532 | +Patches_linux-snapdragon: |
1533 | +upstream_linux-snapdragon: needs-triage |
1534 | +trusty_linux-snapdragon: DNE |
1535 | +xenial_linux-snapdragon: ignored (end of standard support) |
1536 | +bionic_linux-snapdragon: needs-triage |
1537 | +focal_linux-snapdragon: DNE |
1538 | +jammy_linux-snapdragon: DNE |
1539 | +kinetic_linux-snapdragon: DNE |
1540 | diff --git a/active/CVE-2022-20567 b/active/CVE-2022-20567 |
1541 | new file mode 100644 |
1542 | index 0000000..d3f5620 |
1543 | --- /dev/null |
1544 | +++ b/active/CVE-2022-20567 |
1545 | @@ -0,0 +1,757 @@ |
1546 | +Candidate: CVE-2022-20567 |
1547 | +PublicDate: 2022-12-06 |
1548 | +References: |
1549 | + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20567 |
1550 | + https://git.kernel.org/linus/d02ba2a6110c530a32926af8ad441111774d2893 |
1551 | +Description: |
1552 | + [Unknown description] |
1553 | +Ubuntu-Description: |
1554 | +Notes: |
1555 | +Mitigation: |
1556 | +Bugs: |
1557 | +Priority: medium |
1558 | +Discovered-by: |
1559 | +Assigned-to: |
1560 | +CVSS: |
1561 | + |
1562 | +Patches_linux: |
1563 | + break-fix: ee40fb2e1eb5bc0ddd3f2f83c6e39a454ef5a741 d02ba2a6110c530a32926af8ad441111774d2893 |
1564 | +upstream_linux: released (4.15.11-1) |
1565 | +esm-infra/xenial_linux: needs-triage |
1566 | +trusty_linux: ignored (out of standard support) |
1567 | +xenial_linux: ignored (out of standard support) |
1568 | +bionic_linux: needs-triage |
1569 | +focal_linux: not-affected (5.4.0-135.152) |
1570 | +jammy_linux: not-affected |
1571 | +kinetic_linux: not-affected |
1572 | +trusty/esm_linux: not-affected |
1573 | +devel_linux: not-affected |
1574 | + |
1575 | +Patches_linux-hwe: |
1576 | +upstream_linux-hwe: needs-triage |
1577 | +esm-infra/xenial_linux-hwe: needs-triage |
1578 | +trusty_linux-hwe: DNE |
1579 | +xenial_linux-hwe: ignored (end of standard support) |
1580 | +bionic_linux-hwe: ignored (replaced by linux-hwe-5.4) |
1581 | +focal_linux-hwe: DNE |
1582 | +jammy_linux-hwe: DNE |
1583 | +kinetic_linux-hwe: DNE |
1584 | + |
1585 | +Patches_linux-hwe-5.4: |
1586 | +upstream_linux-hwe-5.4: needs-triage |
1587 | +trusty_linux-hwe-5.4: DNE |
1588 | +xenial_linux-hwe-5.4: DNE |
1589 | +bionic_linux-hwe-5.4: needs-triage |
1590 | +focal_linux-hwe-5.4: DNE |
1591 | +jammy_linux-hwe-5.4: DNE |
1592 | +kinetic_linux-hwe-5.4: DNE |
1593 | + |
1594 | +Patches_linux-hwe-5.8: |
1595 | +upstream_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11) |
1596 | +trusty_linux-hwe-5.8: DNE |
1597 | +xenial_linux-hwe-5.8: DNE |
1598 | +bionic_linux-hwe-5.8: DNE |
1599 | +focal_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11) |
1600 | +jammy_linux-hwe-5.8: DNE |
1601 | +kinetic_linux-hwe-5.8: DNE |
1602 | + |
1603 | +Patches_linux-hwe-5.11: |
1604 | +upstream_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13) |
1605 | +trusty_linux-hwe-5.11: DNE |
1606 | +xenial_linux-hwe-5.11: DNE |
1607 | +bionic_linux-hwe-5.11: DNE |
1608 | +focal_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13) |
1609 | +jammy_linux-hwe-5.11: DNE |
1610 | +kinetic_linux-hwe-5.11: DNE |
1611 | + |
1612 | +Patches_linux-hwe-5.13: |
1613 | +upstream_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15) |
1614 | +trusty_linux-hwe-5.13: DNE |
1615 | +xenial_linux-hwe-5.13: DNE |
1616 | +bionic_linux-hwe-5.13: DNE |
1617 | +focal_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15) |
1618 | +jammy_linux-hwe-5.13: DNE |
1619 | +kinetic_linux-hwe-5.13: DNE |
1620 | + |
1621 | +Patches_linux-hwe-5.15: |
1622 | +upstream_linux-hwe-5.15: needs-triage |
1623 | +trusty_linux-hwe-5.15: DNE |
1624 | +xenial_linux-hwe-5.15: DNE |
1625 | +bionic_linux-hwe-5.15: DNE |
1626 | +focal_linux-hwe-5.15: needs-triage |
1627 | +jammy_linux-hwe-5.15: DNE |
1628 | +kinetic_linux-hwe-5.15: DNE |
1629 | + |
1630 | +Patches_linux-hwe-edge: |
1631 | +upstream_linux-hwe-edge: needs-triage |
1632 | +esm-infra/xenial_linux-hwe-edge: ignored (superseded by linux-hwe) |
1633 | +trusty_linux-hwe-edge: DNE |
1634 | +xenial_linux-hwe-edge: ignored (superseded by linux-hwe) |
1635 | +bionic_linux-hwe-edge: ignored (superseded by linux-hwe-5.4) |
1636 | +focal_linux-hwe-edge: DNE |
1637 | +jammy_linux-hwe-edge: DNE |
1638 | +kinetic_linux-hwe-edge: DNE |
1639 | + |
1640 | +Patches_linux-lts-xenial: |
1641 | +upstream_linux-lts-xenial: needs-triage |
1642 | +trusty_linux-lts-xenial: ignored (out of standard support) |
1643 | +xenial_linux-lts-xenial: DNE |
1644 | +bionic_linux-lts-xenial: DNE |
1645 | +focal_linux-lts-xenial: DNE |
1646 | +jammy_linux-lts-xenial: DNE |
1647 | +kinetic_linux-lts-xenial: DNE |
1648 | +trusty/esm_linux-lts-xenial: needs-triage |
1649 | + |
1650 | +Patches_linux-kvm: |
1651 | +upstream_linux-kvm: needs-triage |
1652 | +esm-infra/xenial_linux-kvm: needs-triage |
1653 | +trusty_linux-kvm: DNE |
1654 | +xenial_linux-kvm: ignored (end of standard support) |
1655 | +bionic_linux-kvm: needs-triage |
1656 | +focal_linux-kvm: needs-triage |
1657 | +jammy_linux-kvm: needs-triage |
1658 | +kinetic_linux-kvm: needs-triage |
1659 | +devel_linux-kvm: needs-triage |
1660 | + |
1661 | +Patches_linux-aws: |
1662 | +upstream_linux-aws: needs-triage |
1663 | +esm-infra/xenial_linux-aws: needs-triage |
1664 | +trusty_linux-aws: ignored (out of standard support) |
1665 | +xenial_linux-aws: ignored (end of standard support) |
1666 | +bionic_linux-aws: needs-triage |
1667 | +focal_linux-aws: needs-triage |
1668 | +jammy_linux-aws: needs-triage |
1669 | +kinetic_linux-aws: needs-triage |
1670 | +trusty/esm_linux-aws: needs-triage |
1671 | +devel_linux-aws: needs-triage |
1672 | + |
1673 | +Patches_linux-aws-5.0: |
1674 | +upstream_linux-aws-5.0: needs-triage |
1675 | +trusty_linux-aws-5.0: DNE |
1676 | +xenial_linux-aws-5.0: DNE |
1677 | +bionic_linux-aws-5.0: ignored (superseded by linux-aws-5.3) |
1678 | +focal_linux-aws-5.0: DNE |
1679 | +jammy_linux-aws-5.0: DNE |
1680 | +kinetic_linux-aws-5.0: DNE |
1681 | + |
1682 | +Patches_linux-aws-5.3: |
1683 | +upstream_linux-aws-5.3: ignored (superseded by linux-aws-5.4) |
1684 | +trusty_linux-aws-5.3: DNE |
1685 | +xenial_linux-aws-5.3: DNE |
1686 | +bionic_linux-aws-5.3: ignored (superseded by linux-aws-5.4) |
1687 | +focal_linux-aws-5.3: DNE |
1688 | +jammy_linux-aws-5.3: DNE |
1689 | +kinetic_linux-aws-5.3: DNE |
1690 | + |
1691 | +Patches_linux-aws-5.4: |
1692 | +upstream_linux-aws-5.4: needs-triage |
1693 | +trusty_linux-aws-5.4: DNE |
1694 | +xenial_linux-aws-5.4: DNE |
1695 | +bionic_linux-aws-5.4: needs-triage |
1696 | +focal_linux-aws-5.4: DNE |
1697 | +jammy_linux-aws-5.4: DNE |
1698 | +kinetic_linux-aws-5.4: DNE |
1699 | + |
1700 | +Patches_linux-aws-5.8: |
1701 | +upstream_linux-aws-5.8: ignored (superseded by linux-aws-5.11) |
1702 | +trusty_linux-aws-5.8: DNE |
1703 | +xenial_linux-aws-5.8: DNE |
1704 | +bionic_linux-aws-5.8: DNE |
1705 | +focal_linux-aws-5.8: ignored (superseded by linux-aws-5.11) |
1706 | +jammy_linux-aws-5.8: DNE |
1707 | +kinetic_linux-aws-5.8: DNE |
1708 | + |
1709 | +Patches_linux-aws-5.11: |
1710 | +upstream_linux-aws-5.11: ignored (superseded by linux-aws-5.13) |
1711 | +trusty_linux-aws-5.11: DNE |
1712 | +xenial_linux-aws-5.11: DNE |
1713 | +bionic_linux-aws-5.11: DNE |
1714 | +focal_linux-aws-5.11: ignored (superseded by linux-aws-5.13) |
1715 | +jammy_linux-aws-5.11: DNE |
1716 | +kinetic_linux-aws-5.11: DNE |
1717 | + |
1718 | +Patches_linux-aws-5.13: |
1719 | +upstream_linux-aws-5.13: ignored (superseded by linux-aws-5.15) |
1720 | +trusty_linux-aws-5.13: DNE |
1721 | +xenial_linux-aws-5.13: DNE |
1722 | +bionic_linux-aws-5.13: DNE |
1723 | +focal_linux-aws-5.13: ignored (superseded by linux-aws-5.15) |
1724 | +jammy_linux-aws-5.13: DNE |
1725 | +kinetic_linux-aws-5.13: DNE |
1726 | + |
1727 | +Patches_linux-aws-5.15: |
1728 | +upstream_linux-aws-5.15: needs-triage |
1729 | +trusty_linux-aws-5.15: DNE |
1730 | +xenial_linux-aws-5.15: DNE |
1731 | +bionic_linux-aws-5.15: DNE |
1732 | +focal_linux-aws-5.15: needs-triage |
1733 | +jammy_linux-aws-5.15: DNE |
1734 | +kinetic_linux-aws-5.15: DNE |
1735 | + |
1736 | +Patches_linux-aws-hwe: |
1737 | +upstream_linux-aws-hwe: needs-triage |
1738 | +esm-infra/xenial_linux-aws-hwe: needs-triage |
1739 | +trusty_linux-aws-hwe: DNE |
1740 | +xenial_linux-aws-hwe: ignored (end of standard support) |
1741 | +bionic_linux-aws-hwe: DNE |
1742 | +focal_linux-aws-hwe: DNE |
1743 | +jammy_linux-aws-hwe: DNE |
1744 | +kinetic_linux-aws-hwe: DNE |
1745 | + |
1746 | +Patches_linux-azure: |
1747 | +upstream_linux-azure: needs-triage |
1748 | +esm-infra/xenial_linux-azure: needs-triage |
1749 | +trusty_linux-azure: ignored (out of standard support) |
1750 | +xenial_linux-azure: ignored (end of standard support) |
1751 | +bionic_linux-azure: ignored (superseded by linux-azure-5.3) |
1752 | +focal_linux-azure: needs-triage |
1753 | +jammy_linux-azure: needs-triage |
1754 | +kinetic_linux-azure: needs-triage |
1755 | +trusty/esm_linux-azure: needs-triage |
1756 | +devel_linux-azure: needs-triage |
1757 | + |
1758 | +Patches_linux-azure-4.15: |
1759 | +upstream_linux-azure-4.15: needs-triage |
1760 | +trusty_linux-azure-4.15: DNE |
1761 | +xenial_linux-azure-4.15: DNE |
1762 | +bionic_linux-azure-4.15: needs-triage |
1763 | +focal_linux-azure-4.15: DNE |
1764 | +jammy_linux-azure-4.15: DNE |
1765 | +kinetic_linux-azure-4.15: DNE |
1766 | + |
1767 | +Patches_linux-azure-5.3: |
1768 | +upstream_linux-azure-5.3: ignored (superseded by linux-azure-5.4) |
1769 | +trusty_linux-azure-5.3: DNE |
1770 | +xenial_linux-azure-5.3: DNE |
1771 | +bionic_linux-azure-5.3: ignored (superseded by linux-azure-5.4) |
1772 | +focal_linux-azure-5.3: DNE |
1773 | +jammy_linux-azure-5.3: DNE |
1774 | +kinetic_linux-azure-5.3: DNE |
1775 | + |
1776 | +Patches_linux-azure-5.4: |
1777 | +upstream_linux-azure-5.4: needs-triage |
1778 | +trusty_linux-azure-5.4: DNE |
1779 | +xenial_linux-azure-5.4: DNE |
1780 | +bionic_linux-azure-5.4: needs-triage |
1781 | +focal_linux-azure-5.4: DNE |
1782 | +jammy_linux-azure-5.4: DNE |
1783 | +kinetic_linux-azure-5.4: DNE |
1784 | + |
1785 | +Patches_linux-azure-5.8: |
1786 | +upstream_linux-azure-5.8: ignored (superseded by linux-azure-5.11) |
1787 | +trusty_linux-azure-5.8: DNE |
1788 | +xenial_linux-azure-5.8: DNE |
1789 | +bionic_linux-azure-5.8: DNE |
1790 | +focal_linux-azure-5.8: ignored (superseded by linux-azure-5.11) |
1791 | +jammy_linux-azure-5.8: DNE |
1792 | +kinetic_linux-azure-5.8: DNE |
1793 | + |
1794 | +Patches_linux-azure-5.11: |
1795 | +upstream_linux-azure-5.11: ignored (superseded by linux-azure-5.13) |
1796 | +trusty_linux-azure-5.11: DNE |
1797 | +xenial_linux-azure-5.11: DNE |
1798 | +bionic_linux-azure-5.11: DNE |
1799 | +focal_linux-azure-5.11: ignored (superseded by linux-azure-5.13) |
1800 | +jammy_linux-azure-5.11: DNE |
1801 | +kinetic_linux-azure-5.11: DNE |
1802 | + |
1803 | +Patches_linux-azure-5.13: |
1804 | +upstream_linux-azure-5.13: ignored (superseded by linux-azure-5.15) |
1805 | +trusty_linux-azure-5.13: DNE |
1806 | +xenial_linux-azure-5.13: DNE |
1807 | +bionic_linux-azure-5.13: DNE |
1808 | +focal_linux-azure-5.13: ignored (superseded by linux-azure-5.15) |
1809 | +jammy_linux-azure-5.13: DNE |
1810 | +kinetic_linux-azure-5.13: DNE |
1811 | + |
1812 | +Patches_linux-azure-5.15: |
1813 | +upstream_linux-azure-5.15: needs-triage |
1814 | +trusty_linux-azure-5.15: DNE |
1815 | +xenial_linux-azure-5.15: DNE |
1816 | +bionic_linux-azure-5.15: DNE |
1817 | +focal_linux-azure-5.15: needs-triage |
1818 | +jammy_linux-azure-5.15: DNE |
1819 | +kinetic_linux-azure-5.15: DNE |
1820 | + |
1821 | +Patches_linux-azure-fde: |
1822 | +upstream_linux-azure-fde: needs-triage |
1823 | +trusty_linux-azure-fde: DNE |
1824 | +xenial_linux-azure-fde: DNE |
1825 | +bionic_linux-azure-fde: DNE |
1826 | +focal_linux-azure-fde: needs-triage |
1827 | +jammy_linux-azure-fde: needs-triage |
1828 | +kinetic_linux-azure-fde: DNE |
1829 | + |
1830 | +Patches_linux-azure-fde-5.15: |
1831 | +upstream_linux-azure-fde-5.15: needs-triage |
1832 | +trusty_linux-azure-fde-5.15: DNE |
1833 | +xenial_linux-azure-fde-5.15: DNE |
1834 | +bionic_linux-azure-fde-5.15: DNE |
1835 | +focal_linux-azure-fde-5.15: needs-triage |
1836 | +jammy_linux-azure-fde-5.15: DNE |
1837 | +kinetic_linux-azure-fde-5.15: DNE |
1838 | + |
1839 | +Patches_linux-bluefield: |
1840 | +upstream_linux-bluefield: needs-triage |
1841 | +trusty_linux-bluefield: DNE |
1842 | +xenial_linux-bluefield: DNE |
1843 | +bionic_linux-bluefield: DNE |
1844 | +focal_linux-bluefield: needs-triage |
1845 | +jammy_linux-bluefield: DNE |
1846 | +kinetic_linux-bluefield: DNE |
1847 | + |
1848 | +Patches_linux-dell300x: |
1849 | +upstream_linux-dell300x: needs-triage |
1850 | +trusty_linux-dell300x: DNE |
1851 | +xenial_linux-dell300x: DNE |
1852 | +bionic_linux-dell300x: needs-triage |
1853 | +focal_linux-dell300x: DNE |
1854 | +jammy_linux-dell300x: DNE |
1855 | +kinetic_linux-dell300x: DNE |
1856 | + |
1857 | +Patches_linux-azure-edge: |
1858 | +upstream_linux-azure-edge: needs-triage |
1859 | +trusty_linux-azure-edge: DNE |
1860 | +xenial_linux-azure-edge: DNE |
1861 | +bionic_linux-azure-edge: ignored (superseded by linux-azure-5.3) |
1862 | +focal_linux-azure-edge: DNE |
1863 | +jammy_linux-azure-edge: DNE |
1864 | +kinetic_linux-azure-edge: DNE |
1865 | + |
1866 | +Patches_linux-fips: |
1867 | +upstream_linux-fips: needs-triage |
1868 | +trusty_linux-fips: ignored (out of standard support) |
1869 | +xenial_linux-fips: ignored (out of standard support) |
1870 | +bionic_linux-fips: DNE |
1871 | +focal_linux-fips: DNE |
1872 | +jammy_linux-fips: DNE |
1873 | +kinetic_linux-fips: DNE |
1874 | +fips/xenial_linux-fips: needs-triage |
1875 | +fips/bionic_linux-fips: needs-triage |
1876 | +fips/focal_linux-fips: needs-triage |
1877 | +fips-updates/xenial_linux-fips: needs-triage |
1878 | +fips-updates/bionic_linux-fips: needs-triage |
1879 | +fips-updates/focal_linux-fips: needs-triage |
1880 | + |
1881 | +Patches_linux-gcp: |
1882 | +upstream_linux-gcp: needs-triage |
1883 | +esm-infra/xenial_linux-gcp: needs-triage |
1884 | +trusty_linux-gcp: DNE |
1885 | +xenial_linux-gcp: ignored (end of standard support) |
1886 | +bionic_linux-gcp: ignored (superseded by linux-gcp-5.3) |
1887 | +focal_linux-gcp: needs-triage |
1888 | +jammy_linux-gcp: needs-triage |
1889 | +kinetic_linux-gcp: needs-triage |
1890 | +devel_linux-gcp: needs-triage |
1891 | + |
1892 | +Patches_linux-gcp-4.15: |
1893 | +upstream_linux-gcp-4.15: needs-triage |
1894 | +trusty_linux-gcp-4.15: DNE |
1895 | +xenial_linux-gcp-4.15: DNE |
1896 | +bionic_linux-gcp-4.15: needs-triage |
1897 | +focal_linux-gcp-4.15: DNE |
1898 | +jammy_linux-gcp-4.15: DNE |
1899 | +kinetic_linux-gcp-4.15: DNE |
1900 | + |
1901 | +Patches_linux-gcp-5.3: |
1902 | +upstream_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4) |
1903 | +trusty_linux-gcp-5.3: DNE |
1904 | +xenial_linux-gcp-5.3: DNE |
1905 | +bionic_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4) |
1906 | +focal_linux-gcp-5.3: DNE |
1907 | +jammy_linux-gcp-5.3: DNE |
1908 | +kinetic_linux-gcp-5.3: DNE |
1909 | + |
1910 | +Patches_linux-gcp-5.4: |
1911 | +upstream_linux-gcp-5.4: needs-triage |
1912 | +trusty_linux-gcp-5.4: DNE |
1913 | +xenial_linux-gcp-5.4: DNE |
1914 | +bionic_linux-gcp-5.4: needs-triage |
1915 | +focal_linux-gcp-5.4: DNE |
1916 | +jammy_linux-gcp-5.4: DNE |
1917 | +kinetic_linux-gcp-5.4: DNE |
1918 | + |
1919 | +Patches_linux-gcp-5.8: |
1920 | +upstream_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11) |
1921 | +trusty_linux-gcp-5.8: DNE |
1922 | +xenial_linux-gcp-5.8: DNE |
1923 | +bionic_linux-gcp-5.8: DNE |
1924 | +focal_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11) |
1925 | +jammy_linux-gcp-5.8: DNE |
1926 | +kinetic_linux-gcp-5.8: DNE |
1927 | + |
1928 | +Patches_linux-gcp-5.11: |
1929 | +upstream_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13) |
1930 | +trusty_linux-gcp-5.11: DNE |
1931 | +xenial_linux-gcp-5.11: DNE |
1932 | +bionic_linux-gcp-5.11: DNE |
1933 | +focal_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13) |
1934 | +jammy_linux-gcp-5.11: DNE |
1935 | +kinetic_linux-gcp-5.11: DNE |
1936 | + |
1937 | +Patches_linux-gcp-5.13: |
1938 | +upstream_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15) |
1939 | +trusty_linux-gcp-5.13: DNE |
1940 | +xenial_linux-gcp-5.13: DNE |
1941 | +bionic_linux-gcp-5.13: DNE |
1942 | +focal_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15) |
1943 | +jammy_linux-gcp-5.13: DNE |
1944 | +kinetic_linux-gcp-5.13: DNE |
1945 | + |
1946 | +Patches_linux-gcp-5.15: |
1947 | +upstream_linux-gcp-5.15: needs-triage |
1948 | +trusty_linux-gcp-5.15: DNE |
1949 | +xenial_linux-gcp-5.15: DNE |
1950 | +bionic_linux-gcp-5.15: DNE |
1951 | +focal_linux-gcp-5.15: needs-triage |
1952 | +jammy_linux-gcp-5.15: DNE |
1953 | +kinetic_linux-gcp-5.15: DNE |
1954 | + |
1955 | +Patches_linux-gke: |
1956 | +upstream_linux-gke: needs-triage |
1957 | +trusty_linux-gke: DNE |
1958 | +xenial_linux-gke: ignored (reached end of standard support) |
1959 | +bionic_linux-gke: DNE |
1960 | +focal_linux-gke: needs-triage |
1961 | +jammy_linux-gke: needs-triage |
1962 | +kinetic_linux-gke: DNE |
1963 | + |
1964 | +Patches_linux-gke-4.15: |
1965 | +upstream_linux-gke-4.15: needs-triage |
1966 | +trusty_linux-gke-4.15: DNE |
1967 | +xenial_linux-gke-4.15: DNE |
1968 | +bionic_linux-gke-4.15: needs-triage |
1969 | +focal_linux-gke-4.15: DNE |
1970 | +jammy_linux-gke-4.15: DNE |
1971 | +kinetic_linux-gke-4.15: DNE |
1972 | + |
1973 | +Patches_linux-gke-5.0: |
1974 | +upstream_linux-gke-5.0: needs-triage |
1975 | +trusty_linux-gke-5.0: DNE |
1976 | +xenial_linux-gke-5.0: DNE |
1977 | +bionic_linux-gke-5.0: ignored (superseded by linux-gke-5.3) |
1978 | +focal_linux-gke-5.0: DNE |
1979 | +jammy_linux-gke-5.0: DNE |
1980 | +kinetic_linux-gke-5.0: DNE |
1981 | + |
1982 | +Patches_linux-gke-5.3: |
1983 | +upstream_linux-gke-5.3: ignored (superseded by linux-gke-5.4) |
1984 | +trusty_linux-gke-5.3: DNE |
1985 | +xenial_linux-gke-5.3: DNE |
1986 | +bionic_linux-gke-5.3: ignored (superseded by linux-gke-5.4) |
1987 | +focal_linux-gke-5.3: DNE |
1988 | +jammy_linux-gke-5.3: DNE |
1989 | +kinetic_linux-gke-5.3: DNE |
1990 | + |
1991 | +Patches_linux-gke-5.4: |
1992 | +upstream_linux-gke-5.4: needs-triage |
1993 | +trusty_linux-gke-5.4: DNE |
1994 | +xenial_linux-gke-5.4: DNE |
1995 | +bionic_linux-gke-5.4: needs-triage |
1996 | +focal_linux-gke-5.4: DNE |
1997 | +jammy_linux-gke-5.4: DNE |
1998 | +kinetic_linux-gke-5.4: DNE |
1999 | + |
2000 | +Patches_linux-gke-5.15: |
2001 | +upstream_linux-gke-5.15: needs-triage |
2002 | +trusty_linux-gke-5.15: DNE |
2003 | +xenial_linux-gke-5.15: DNE |
2004 | +bionic_linux-gke-5.15: DNE |
2005 | +focal_linux-gke-5.15: needs-triage |
2006 | +jammy_linux-gke-5.15: DNE |
2007 | +kinetic_linux-gke-5.15: DNE |
2008 | + |
2009 | +Patches_linux-gkeop: |
2010 | +upstream_linux-gkeop: needs-triage |
2011 | +trusty_linux-gkeop: DNE |
2012 | +xenial_linux-gkeop: DNE |
2013 | +bionic_linux-gkeop: DNE |
2014 | +focal_linux-gkeop: needs-triage |
2015 | +jammy_linux-gkeop: needs-triage |
2016 | +kinetic_linux-gkeop: DNE |
2017 | + |
2018 | +Patches_linux-gkeop-5.4: |
2019 | +upstream_linux-gkeop-5.4: needs-triage |
2020 | +trusty_linux-gkeop-5.4: DNE |
2021 | +xenial_linux-gkeop-5.4: DNE |
2022 | +bionic_linux-gkeop-5.4: needs-triage |
2023 | +focal_linux-gkeop-5.4: DNE |
2024 | +jammy_linux-gkeop-5.4: DNE |
2025 | +kinetic_linux-gkeop-5.4: DNE |
2026 | + |
2027 | +Patches_linux-ibm: |
2028 | +upstream_linux-ibm: needs-triage |
2029 | +trusty_linux-ibm: DNE |
2030 | +xenial_linux-ibm: DNE |
2031 | +bionic_linux-ibm: DNE |
2032 | +focal_linux-ibm: needs-triage |
2033 | +jammy_linux-ibm: needs-triage |
2034 | +kinetic_linux-ibm: needs-triage |
2035 | +devel_linux-ibm: needs-triage |
2036 | + |
2037 | +Patches_linux-ibm-5.4: |
2038 | +upstream_linux-ibm-5.4: needs-triage |
2039 | +trusty_linux-ibm-5.4: DNE |
2040 | +xenial_linux-ibm-5.4: DNE |
2041 | +bionic_linux-ibm-5.4: needs-triage |
2042 | +focal_linux-ibm-5.4: DNE |
2043 | +jammy_linux-ibm-5.4: DNE |
2044 | +kinetic_linux-ibm-5.4: DNE |
2045 | + |
2046 | +Patches_linux-intel-5.13: |
2047 | +upstream_linux-intel-5.13: needs-triage |
2048 | +trusty_linux-intel-5.13: DNE |
2049 | +xenial_linux-intel-5.13: DNE |
2050 | +bionic_linux-intel-5.13: DNE |
2051 | +focal_linux-intel-5.13: needs-triage |
2052 | +jammy_linux-intel-5.13: DNE |
2053 | +kinetic_linux-intel-5.13: DNE |
2054 | + |
2055 | +Patches_linux-intel-iotg: |
2056 | +upstream_linux-intel-iotg: needs-triage |
2057 | +trusty_linux-intel-iotg: DNE |
2058 | +xenial_linux-intel-iotg: DNE |
2059 | +bionic_linux-intel-iotg: DNE |
2060 | +focal_linux-intel-iotg: DNE |
2061 | +jammy_linux-intel-iotg: needs-triage |
2062 | +kinetic_linux-intel-iotg: DNE |
2063 | + |
2064 | +Patches_linux-intel-iotg-5.15: |
2065 | +upstream_linux-intel-iotg-5.15: needs-triage |
2066 | +trusty_linux-intel-iotg-5.15: DNE |
2067 | +xenial_linux-intel-iotg-5.15: DNE |
2068 | +bionic_linux-intel-iotg-5.15: DNE |
2069 | +focal_linux-intel-iotg-5.15: needs-triage |
2070 | +jammy_linux-intel-iotg-5.15: DNE |
2071 | +kinetic_linux-intel-iotg-5.15: DNE |
2072 | + |
2073 | +Patches_linux-lowlatency: |
2074 | +upstream_linux-lowlatency: needs-triage |
2075 | +trusty_linux-lowlatency: DNE |
2076 | +xenial_linux-lowlatency: DNE |
2077 | +bionic_linux-lowlatency: DNE |
2078 | +focal_linux-lowlatency: DNE |
2079 | +jammy_linux-lowlatency: needs-triage |
2080 | +kinetic_linux-lowlatency: needs-triage |
2081 | +devel_linux-lowlatency: needs-triage |
2082 | + |
2083 | +Patches_linux-lowlatency-hwe-5.15: |
2084 | +upstream_linux-lowlatency-hwe-5.15: needs-triage |
2085 | +trusty_linux-lowlatency-hwe-5.15: DNE |
2086 | +xenial_linux-lowlatency-hwe-5.15: DNE |
2087 | +bionic_linux-lowlatency-hwe-5.15: DNE |
2088 | +focal_linux-lowlatency-hwe-5.15: needs-triage |
2089 | +jammy_linux-lowlatency-hwe-5.15: DNE |
2090 | +kinetic_linux-lowlatency-hwe-5.15: DNE |
2091 | + |
2092 | +Patches_linux-oracle: |
2093 | +upstream_linux-oracle: needs-triage |
2094 | +esm-infra/xenial_linux-oracle: needs-triage |
2095 | +trusty_linux-oracle: DNE |
2096 | +xenial_linux-oracle: ignored (end of standard support) |
2097 | +bionic_linux-oracle: needs-triage |
2098 | +focal_linux-oracle: needs-triage |
2099 | +jammy_linux-oracle: needs-triage |
2100 | +kinetic_linux-oracle: needs-triage |
2101 | +devel_linux-oracle: needs-triage |
2102 | + |
2103 | +Patches_linux-oracle-5.0: |
2104 | +upstream_linux-oracle-5.0: needs-triage |
2105 | +trusty_linux-oracle-5.0: DNE |
2106 | +xenial_linux-oracle-5.0: DNE |
2107 | +bionic_linux-oracle-5.0: ignored (superseded by linux-oracle-5.3) |
2108 | +focal_linux-oracle-5.0: DNE |
2109 | +jammy_linux-oracle-5.0: DNE |
2110 | +kinetic_linux-oracle-5.0: DNE |
2111 | + |
2112 | +Patches_linux-oracle-5.3: |
2113 | +upstream_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4) |
2114 | +trusty_linux-oracle-5.3: DNE |
2115 | +xenial_linux-oracle-5.3: DNE |
2116 | +bionic_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4) |
2117 | +focal_linux-oracle-5.3: DNE |
2118 | +jammy_linux-oracle-5.3: DNE |
2119 | +kinetic_linux-oracle-5.3: DNE |
2120 | + |
2121 | +Patches_linux-oracle-5.4: |
2122 | +upstream_linux-oracle-5.4: needs-triage |
2123 | +trusty_linux-oracle-5.4: DNE |
2124 | +xenial_linux-oracle-5.4: DNE |
2125 | +bionic_linux-oracle-5.4: needs-triage |
2126 | +focal_linux-oracle-5.4: DNE |
2127 | +jammy_linux-oracle-5.4: DNE |
2128 | +kinetic_linux-oracle-5.4: DNE |
2129 | + |
2130 | +Patches_linux-oracle-5.8: |
2131 | +upstream_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11) |
2132 | +trusty_linux-oracle-5.8: DNE |
2133 | +xenial_linux-oracle-5.8: DNE |
2134 | +bionic_linux-oracle-5.8: DNE |
2135 | +focal_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11) |
2136 | +jammy_linux-oracle-5.8: DNE |
2137 | +kinetic_linux-oracle-5.8: DNE |
2138 | + |
2139 | +Patches_linux-oracle-5.11: |
2140 | +upstream_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13) |
2141 | +trusty_linux-oracle-5.11: DNE |
2142 | +xenial_linux-oracle-5.11: DNE |
2143 | +bionic_linux-oracle-5.11: DNE |
2144 | +focal_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13) |
2145 | +jammy_linux-oracle-5.11: DNE |
2146 | +kinetic_linux-oracle-5.11: DNE |
2147 | + |
2148 | +Patches_linux-oracle-5.13: |
2149 | +upstream_linux-oracle-5.13: needs-triage |
2150 | +trusty_linux-oracle-5.13: DNE |
2151 | +xenial_linux-oracle-5.13: DNE |
2152 | +bionic_linux-oracle-5.13: DNE |
2153 | +focal_linux-oracle-5.13: needs-triage |
2154 | +jammy_linux-oracle-5.13: DNE |
2155 | +kinetic_linux-oracle-5.13: DNE |
2156 | + |
2157 | +Patches_linux-oracle-5.15: |
2158 | +upstream_linux-oracle-5.15: needs-triage |
2159 | +trusty_linux-oracle-5.15: DNE |
2160 | +xenial_linux-oracle-5.15: DNE |
2161 | +bionic_linux-oracle-5.15: DNE |
2162 | +focal_linux-oracle-5.15: needs-triage |
2163 | +jammy_linux-oracle-5.15: DNE |
2164 | +kinetic_linux-oracle-5.15: DNE |
2165 | + |
2166 | +Patches_linux-oem: |
2167 | +upstream_linux-oem: needs-triage |
2168 | +trusty_linux-oem: DNE |
2169 | +xenial_linux-oem: ignored (superseded by linux-hwe) |
2170 | +bionic_linux-oem: needs-triage |
2171 | +focal_linux-oem: DNE |
2172 | +jammy_linux-oem: DNE |
2173 | +kinetic_linux-oem: DNE |
2174 | + |
2175 | +Patches_linux-oem-5.6: |
2176 | +upstream_linux-oem-5.6: needs-triage |
2177 | +trusty_linux-oem-5.6: DNE |
2178 | +xenial_linux-oem-5.6: DNE |
2179 | +bionic_linux-oem-5.6: DNE |
2180 | +focal_linux-oem-5.6: needs-triage |
2181 | +jammy_linux-oem-5.6: DNE |
2182 | +kinetic_linux-oem-5.6: DNE |
2183 | + |
2184 | +Patches_linux-oem-5.10: |
2185 | +upstream_linux-oem-5.10: needs-triage |
2186 | +trusty_linux-oem-5.10: DNE |
2187 | +xenial_linux-oem-5.10: DNE |
2188 | +bionic_linux-oem-5.10: DNE |
2189 | +focal_linux-oem-5.10: needs-triage |
2190 | +jammy_linux-oem-5.10: DNE |
2191 | +kinetic_linux-oem-5.10: DNE |
2192 | + |
2193 | +Patches_linux-oem-5.13: |
2194 | +upstream_linux-oem-5.13: ignored (superseded by linux-oem-5.14) |
2195 | +trusty_linux-oem-5.13: DNE |
2196 | +xenial_linux-oem-5.13: DNE |
2197 | +bionic_linux-oem-5.13: DNE |
2198 | +focal_linux-oem-5.13: ignored (superseded by linux-oem-5.14) |
2199 | +jammy_linux-oem-5.13: DNE |
2200 | +kinetic_linux-oem-5.13: DNE |
2201 | + |
2202 | +Patches_linux-oem-5.14: |
2203 | +upstream_linux-oem-5.14: needs-triage |
2204 | +trusty_linux-oem-5.14: DNE |
2205 | +xenial_linux-oem-5.14: DNE |
2206 | +bionic_linux-oem-5.14: DNE |
2207 | +focal_linux-oem-5.14: needs-triage |
2208 | +jammy_linux-oem-5.14: DNE |
2209 | +kinetic_linux-oem-5.14: DNE |
2210 | + |
2211 | +Patches_linux-oem-5.17: |
2212 | +upstream_linux-oem-5.17: needs-triage |
2213 | +trusty_linux-oem-5.17: DNE |
2214 | +xenial_linux-oem-5.17: DNE |
2215 | +bionic_linux-oem-5.17: DNE |
2216 | +focal_linux-oem-5.17: DNE |
2217 | +jammy_linux-oem-5.17: needs-triage |
2218 | +kinetic_linux-oem-5.17: needs-triage |
2219 | +devel_linux-oem-5.17: needs-triage |
2220 | + |
2221 | +Patches_linux-oem-osp1: |
2222 | +upstream_linux-oem-osp1: needs-triage |
2223 | +trusty_linux-oem-osp1: DNE |
2224 | +xenial_linux-oem-osp1: DNE |
2225 | +bionic_linux-oem-osp1: needs-triage |
2226 | +focal_linux-oem-osp1: DNE |
2227 | +jammy_linux-oem-osp1: DNE |
2228 | +kinetic_linux-oem-osp1: DNE |
2229 | + |
2230 | +Patches_linux-raspi: |
2231 | +upstream_linux-raspi: needs-triage |
2232 | +trusty_linux-raspi: DNE |
2233 | +xenial_linux-raspi: DNE |
2234 | +bionic_linux-raspi: DNE |
2235 | +focal_linux-raspi: needs-triage |
2236 | +jammy_linux-raspi: needs-triage |
2237 | +kinetic_linux-raspi: needs-triage |
2238 | +devel_linux-raspi: needs-triage |
2239 | + |
2240 | +Patches_linux-raspi2: |
2241 | +upstream_linux-raspi2: needs-triage |
2242 | +trusty_linux-raspi2: DNE |
2243 | +xenial_linux-raspi2: ignored (end of standard support) |
2244 | +bionic_linux-raspi2: needs-triage |
2245 | +focal_linux-raspi2: ignored (replaced by linux-raspi) |
2246 | +jammy_linux-raspi2: DNE |
2247 | +kinetic_linux-raspi2: DNE |
2248 | + |
2249 | +Patches_linux-raspi2-5.3: |
2250 | +upstream_linux-raspi2-5.3: ignored (superseded by linux-raspi2-5.4) |
2251 | +trusty_linux-raspi2-5.3: DNE |
2252 | +xenial_linux-raspi2-5.3: DNE |
2253 | +bionic_linux-raspi2-5.3: ignored (superseded by linux-raspi-5.4) |
2254 | +focal_linux-raspi2-5.3: DNE |
2255 | +jammy_linux-raspi2-5.3: DNE |
2256 | +kinetic_linux-raspi2-5.3: DNE |
2257 | + |
2258 | +Patches_linux-raspi-5.4: |
2259 | +upstream_linux-raspi-5.4: needs-triage |
2260 | +trusty_linux-raspi-5.4: DNE |
2261 | +xenial_linux-raspi-5.4: DNE |
2262 | +bionic_linux-raspi-5.4: needs-triage |
2263 | +focal_linux-raspi-5.4: DNE |
2264 | +jammy_linux-raspi-5.4: DNE |
2265 | +kinetic_linux-raspi-5.4: DNE |
2266 | + |
2267 | +Patches_linux-riscv: |
2268 | +upstream_linux-riscv: needs-triage |
2269 | +trusty_linux-riscv: DNE |
2270 | +xenial_linux-riscv: DNE |
2271 | +bionic_linux-riscv: DNE |
2272 | +focal_linux-riscv: ignored (superseded by linux-riscv-5.8) |
2273 | +jammy_linux-riscv: needs-triage |
2274 | +kinetic_linux-riscv: needs-triage |
2275 | +devel_linux-riscv: needs-triage |
2276 | + |
2277 | +Patches_linux-riscv-5.8: |
2278 | +upstream_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11) |
2279 | +trusty_linux-riscv-5.8: DNE |
2280 | +xenial_linux-riscv-5.8: DNE |
2281 | +bionic_linux-riscv-5.8: DNE |
2282 | +focal_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11) |
2283 | +jammy_linux-riscv-5.8: DNE |
2284 | +kinetic_linux-riscv-5.8: DNE |
2285 | + |
2286 | +Patches_linux-riscv-5.11: |
2287 | +upstream_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13) |
2288 | +trusty_linux-riscv-5.11: DNE |
2289 | +xenial_linux-riscv-5.11: DNE |
2290 | +bionic_linux-riscv-5.11: DNE |
2291 | +focal_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13) |
2292 | +jammy_linux-riscv-5.11: DNE |
2293 | +kinetic_linux-riscv-5.11: DNE |
2294 | + |
2295 | +Patches_linux-snapdragon: |
2296 | +upstream_linux-snapdragon: needs-triage |
2297 | +trusty_linux-snapdragon: DNE |
2298 | +xenial_linux-snapdragon: ignored (end of standard support) |
2299 | +bionic_linux-snapdragon: needs-triage |
2300 | +focal_linux-snapdragon: DNE |
2301 | +jammy_linux-snapdragon: DNE |
2302 | +kinetic_linux-snapdragon: DNE |
2303 | diff --git a/active/CVE-2022-20568 b/active/CVE-2022-20568 |
2304 | new file mode 100644 |
2305 | index 0000000..e74b01d |
2306 | --- /dev/null |
2307 | +++ b/active/CVE-2022-20568 |
2308 | @@ -0,0 +1,759 @@ |
2309 | +Candidate: CVE-2022-20568 |
2310 | +PublicDate: 2022-12-06 |
2311 | +References: |
2312 | + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20568 |
2313 | + https://source.android.com/docs/security/bulletin/pixel/2022-12-01 |
2314 | + https://android.googlesource.com/kernel/common/+/bc80ea8a4296c4d75f7e3e27b65718cae09f20f1 |
2315 | + https://lore.kernel.org/io-uring/YoOJ%2FT4QRKC+fAZE@google.com/ |
2316 | +Description: |
2317 | + [Unknown description] |
2318 | +Ubuntu-Description: |
2319 | +Notes: |
2320 | + amurray| Appears to only affect the upstream stable 5.10 kernel |
2321 | +Mitigation: |
2322 | +Bugs: |
2323 | +Priority: medium |
2324 | +Discovered-by: |
2325 | +Assigned-to: |
2326 | +CVSS: |
2327 | + |
2328 | +Patches_linux: |
2329 | +upstream_linux: released (5.14.6-1) |
2330 | +esm-infra/xenial_linux: needs-triage |
2331 | +trusty_linux: ignored (out of standard support) |
2332 | +xenial_linux: ignored (out of standard support) |
2333 | +bionic_linux: needs-triage |
2334 | +focal_linux: needs-triage |
2335 | +jammy_linux: not-affected (5.15.0-56.62) |
2336 | +kinetic_linux: not-affected |
2337 | +trusty/esm_linux: not-affected |
2338 | +devel_linux: not-affected |
2339 | + |
2340 | +Patches_linux-hwe: |
2341 | +upstream_linux-hwe: needs-triage |
2342 | +esm-infra/xenial_linux-hwe: needs-triage |
2343 | +trusty_linux-hwe: DNE |
2344 | +xenial_linux-hwe: ignored (end of standard support) |
2345 | +bionic_linux-hwe: ignored (replaced by linux-hwe-5.4) |
2346 | +focal_linux-hwe: DNE |
2347 | +jammy_linux-hwe: DNE |
2348 | +kinetic_linux-hwe: DNE |
2349 | + |
2350 | +Patches_linux-hwe-5.4: |
2351 | +upstream_linux-hwe-5.4: needs-triage |
2352 | +trusty_linux-hwe-5.4: DNE |
2353 | +xenial_linux-hwe-5.4: DNE |
2354 | +bionic_linux-hwe-5.4: needs-triage |
2355 | +focal_linux-hwe-5.4: DNE |
2356 | +jammy_linux-hwe-5.4: DNE |
2357 | +kinetic_linux-hwe-5.4: DNE |
2358 | + |
2359 | +Patches_linux-hwe-5.8: |
2360 | +upstream_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11) |
2361 | +trusty_linux-hwe-5.8: DNE |
2362 | +xenial_linux-hwe-5.8: DNE |
2363 | +bionic_linux-hwe-5.8: DNE |
2364 | +focal_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11) |
2365 | +jammy_linux-hwe-5.8: DNE |
2366 | +kinetic_linux-hwe-5.8: DNE |
2367 | + |
2368 | +Patches_linux-hwe-5.11: |
2369 | +upstream_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13) |
2370 | +trusty_linux-hwe-5.11: DNE |
2371 | +xenial_linux-hwe-5.11: DNE |
2372 | +bionic_linux-hwe-5.11: DNE |
2373 | +focal_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13) |
2374 | +jammy_linux-hwe-5.11: DNE |
2375 | +kinetic_linux-hwe-5.11: DNE |
2376 | + |
2377 | +Patches_linux-hwe-5.13: |
2378 | +upstream_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15) |
2379 | +trusty_linux-hwe-5.13: DNE |
2380 | +xenial_linux-hwe-5.13: DNE |
2381 | +bionic_linux-hwe-5.13: DNE |
2382 | +focal_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15) |
2383 | +jammy_linux-hwe-5.13: DNE |
2384 | +kinetic_linux-hwe-5.13: DNE |
2385 | + |
2386 | +Patches_linux-hwe-5.15: |
2387 | +upstream_linux-hwe-5.15: needs-triage |
2388 | +trusty_linux-hwe-5.15: DNE |
2389 | +xenial_linux-hwe-5.15: DNE |
2390 | +bionic_linux-hwe-5.15: DNE |
2391 | +focal_linux-hwe-5.15: needs-triage |
2392 | +jammy_linux-hwe-5.15: DNE |
2393 | +kinetic_linux-hwe-5.15: DNE |
2394 | + |
2395 | +Patches_linux-hwe-edge: |
2396 | +upstream_linux-hwe-edge: needs-triage |
2397 | +esm-infra/xenial_linux-hwe-edge: ignored (superseded by linux-hwe) |
2398 | +trusty_linux-hwe-edge: DNE |
2399 | +xenial_linux-hwe-edge: ignored (superseded by linux-hwe) |
2400 | +bionic_linux-hwe-edge: ignored (superseded by linux-hwe-5.4) |
2401 | +focal_linux-hwe-edge: DNE |
2402 | +jammy_linux-hwe-edge: DNE |
2403 | +kinetic_linux-hwe-edge: DNE |
2404 | + |
2405 | +Patches_linux-lts-xenial: |
2406 | +upstream_linux-lts-xenial: needs-triage |
2407 | +trusty_linux-lts-xenial: ignored (out of standard support) |
2408 | +xenial_linux-lts-xenial: DNE |
2409 | +bionic_linux-lts-xenial: DNE |
2410 | +focal_linux-lts-xenial: DNE |
2411 | +jammy_linux-lts-xenial: DNE |
2412 | +kinetic_linux-lts-xenial: DNE |
2413 | +trusty/esm_linux-lts-xenial: needs-triage |
2414 | + |
2415 | +Patches_linux-kvm: |
2416 | +upstream_linux-kvm: needs-triage |
2417 | +esm-infra/xenial_linux-kvm: needs-triage |
2418 | +trusty_linux-kvm: DNE |
2419 | +xenial_linux-kvm: ignored (end of standard support) |
2420 | +bionic_linux-kvm: needs-triage |
2421 | +focal_linux-kvm: needs-triage |
2422 | +jammy_linux-kvm: needs-triage |
2423 | +kinetic_linux-kvm: needs-triage |
2424 | +devel_linux-kvm: needs-triage |
2425 | + |
2426 | +Patches_linux-aws: |
2427 | +upstream_linux-aws: needs-triage |
2428 | +esm-infra/xenial_linux-aws: needs-triage |
2429 | +trusty_linux-aws: ignored (out of standard support) |
2430 | +xenial_linux-aws: ignored (end of standard support) |
2431 | +bionic_linux-aws: needs-triage |
2432 | +focal_linux-aws: needs-triage |
2433 | +jammy_linux-aws: needs-triage |
2434 | +kinetic_linux-aws: needs-triage |
2435 | +trusty/esm_linux-aws: needs-triage |
2436 | +devel_linux-aws: needs-triage |
2437 | + |
2438 | +Patches_linux-aws-5.0: |
2439 | +upstream_linux-aws-5.0: needs-triage |
2440 | +trusty_linux-aws-5.0: DNE |
2441 | +xenial_linux-aws-5.0: DNE |
2442 | +bionic_linux-aws-5.0: ignored (superseded by linux-aws-5.3) |
2443 | +focal_linux-aws-5.0: DNE |
2444 | +jammy_linux-aws-5.0: DNE |
2445 | +kinetic_linux-aws-5.0: DNE |
2446 | + |
2447 | +Patches_linux-aws-5.3: |
2448 | +upstream_linux-aws-5.3: ignored (superseded by linux-aws-5.4) |
2449 | +trusty_linux-aws-5.3: DNE |
2450 | +xenial_linux-aws-5.3: DNE |
2451 | +bionic_linux-aws-5.3: ignored (superseded by linux-aws-5.4) |
2452 | +focal_linux-aws-5.3: DNE |
2453 | +jammy_linux-aws-5.3: DNE |
2454 | +kinetic_linux-aws-5.3: DNE |
2455 | + |
2456 | +Patches_linux-aws-5.4: |
2457 | +upstream_linux-aws-5.4: needs-triage |
2458 | +trusty_linux-aws-5.4: DNE |
2459 | +xenial_linux-aws-5.4: DNE |
2460 | +bionic_linux-aws-5.4: needs-triage |
2461 | +focal_linux-aws-5.4: DNE |
2462 | +jammy_linux-aws-5.4: DNE |
2463 | +kinetic_linux-aws-5.4: DNE |
2464 | + |
2465 | +Patches_linux-aws-5.8: |
2466 | +upstream_linux-aws-5.8: ignored (superseded by linux-aws-5.11) |
2467 | +trusty_linux-aws-5.8: DNE |
2468 | +xenial_linux-aws-5.8: DNE |
2469 | +bionic_linux-aws-5.8: DNE |
2470 | +focal_linux-aws-5.8: ignored (superseded by linux-aws-5.11) |
2471 | +jammy_linux-aws-5.8: DNE |
2472 | +kinetic_linux-aws-5.8: DNE |
2473 | + |
2474 | +Patches_linux-aws-5.11: |
2475 | +upstream_linux-aws-5.11: ignored (superseded by linux-aws-5.13) |
2476 | +trusty_linux-aws-5.11: DNE |
2477 | +xenial_linux-aws-5.11: DNE |
2478 | +bionic_linux-aws-5.11: DNE |
2479 | +focal_linux-aws-5.11: ignored (superseded by linux-aws-5.13) |
2480 | +jammy_linux-aws-5.11: DNE |
2481 | +kinetic_linux-aws-5.11: DNE |
2482 | + |
2483 | +Patches_linux-aws-5.13: |
2484 | +upstream_linux-aws-5.13: ignored (superseded by linux-aws-5.15) |
2485 | +trusty_linux-aws-5.13: DNE |
2486 | +xenial_linux-aws-5.13: DNE |
2487 | +bionic_linux-aws-5.13: DNE |
2488 | +focal_linux-aws-5.13: ignored (superseded by linux-aws-5.15) |
2489 | +jammy_linux-aws-5.13: DNE |
2490 | +kinetic_linux-aws-5.13: DNE |
2491 | + |
2492 | +Patches_linux-aws-5.15: |
2493 | +upstream_linux-aws-5.15: needs-triage |
2494 | +trusty_linux-aws-5.15: DNE |
2495 | +xenial_linux-aws-5.15: DNE |
2496 | +bionic_linux-aws-5.15: DNE |
2497 | +focal_linux-aws-5.15: needs-triage |
2498 | +jammy_linux-aws-5.15: DNE |
2499 | +kinetic_linux-aws-5.15: DNE |
2500 | + |
2501 | +Patches_linux-aws-hwe: |
2502 | +upstream_linux-aws-hwe: needs-triage |
2503 | +esm-infra/xenial_linux-aws-hwe: needs-triage |
2504 | +trusty_linux-aws-hwe: DNE |
2505 | +xenial_linux-aws-hwe: ignored (end of standard support) |
2506 | +bionic_linux-aws-hwe: DNE |
2507 | +focal_linux-aws-hwe: DNE |
2508 | +jammy_linux-aws-hwe: DNE |
2509 | +kinetic_linux-aws-hwe: DNE |
2510 | + |
2511 | +Patches_linux-azure: |
2512 | +upstream_linux-azure: needs-triage |
2513 | +esm-infra/xenial_linux-azure: needs-triage |
2514 | +trusty_linux-azure: ignored (out of standard support) |
2515 | +xenial_linux-azure: ignored (end of standard support) |
2516 | +bionic_linux-azure: ignored (superseded by linux-azure-5.3) |
2517 | +focal_linux-azure: needs-triage |
2518 | +jammy_linux-azure: needs-triage |
2519 | +kinetic_linux-azure: needs-triage |
2520 | +trusty/esm_linux-azure: needs-triage |
2521 | +devel_linux-azure: needs-triage |
2522 | + |
2523 | +Patches_linux-azure-4.15: |
2524 | +upstream_linux-azure-4.15: needs-triage |
2525 | +trusty_linux-azure-4.15: DNE |
2526 | +xenial_linux-azure-4.15: DNE |
2527 | +bionic_linux-azure-4.15: needs-triage |
2528 | +focal_linux-azure-4.15: DNE |
2529 | +jammy_linux-azure-4.15: DNE |
2530 | +kinetic_linux-azure-4.15: DNE |
2531 | + |
2532 | +Patches_linux-azure-5.3: |
2533 | +upstream_linux-azure-5.3: ignored (superseded by linux-azure-5.4) |
2534 | +trusty_linux-azure-5.3: DNE |
2535 | +xenial_linux-azure-5.3: DNE |
2536 | +bionic_linux-azure-5.3: ignored (superseded by linux-azure-5.4) |
2537 | +focal_linux-azure-5.3: DNE |
2538 | +jammy_linux-azure-5.3: DNE |
2539 | +kinetic_linux-azure-5.3: DNE |
2540 | + |
2541 | +Patches_linux-azure-5.4: |
2542 | +upstream_linux-azure-5.4: needs-triage |
2543 | +trusty_linux-azure-5.4: DNE |
2544 | +xenial_linux-azure-5.4: DNE |
2545 | +bionic_linux-azure-5.4: needs-triage |
2546 | +focal_linux-azure-5.4: DNE |
2547 | +jammy_linux-azure-5.4: DNE |
2548 | +kinetic_linux-azure-5.4: DNE |
2549 | + |
2550 | +Patches_linux-azure-5.8: |
2551 | +upstream_linux-azure-5.8: ignored (superseded by linux-azure-5.11) |
2552 | +trusty_linux-azure-5.8: DNE |
2553 | +xenial_linux-azure-5.8: DNE |
2554 | +bionic_linux-azure-5.8: DNE |
2555 | +focal_linux-azure-5.8: ignored (superseded by linux-azure-5.11) |
2556 | +jammy_linux-azure-5.8: DNE |
2557 | +kinetic_linux-azure-5.8: DNE |
2558 | + |
2559 | +Patches_linux-azure-5.11: |
2560 | +upstream_linux-azure-5.11: ignored (superseded by linux-azure-5.13) |
2561 | +trusty_linux-azure-5.11: DNE |
2562 | +xenial_linux-azure-5.11: DNE |
2563 | +bionic_linux-azure-5.11: DNE |
2564 | +focal_linux-azure-5.11: ignored (superseded by linux-azure-5.13) |
2565 | +jammy_linux-azure-5.11: DNE |
2566 | +kinetic_linux-azure-5.11: DNE |
2567 | + |
2568 | +Patches_linux-azure-5.13: |
2569 | +upstream_linux-azure-5.13: ignored (superseded by linux-azure-5.15) |
2570 | +trusty_linux-azure-5.13: DNE |
2571 | +xenial_linux-azure-5.13: DNE |
2572 | +bionic_linux-azure-5.13: DNE |
2573 | +focal_linux-azure-5.13: ignored (superseded by linux-azure-5.15) |
2574 | +jammy_linux-azure-5.13: DNE |
2575 | +kinetic_linux-azure-5.13: DNE |
2576 | + |
2577 | +Patches_linux-azure-5.15: |
2578 | +upstream_linux-azure-5.15: needs-triage |
2579 | +trusty_linux-azure-5.15: DNE |
2580 | +xenial_linux-azure-5.15: DNE |
2581 | +bionic_linux-azure-5.15: DNE |
2582 | +focal_linux-azure-5.15: needs-triage |
2583 | +jammy_linux-azure-5.15: DNE |
2584 | +kinetic_linux-azure-5.15: DNE |
2585 | + |
2586 | +Patches_linux-azure-fde: |
2587 | +upstream_linux-azure-fde: needs-triage |
2588 | +trusty_linux-azure-fde: DNE |
2589 | +xenial_linux-azure-fde: DNE |
2590 | +bionic_linux-azure-fde: DNE |
2591 | +focal_linux-azure-fde: needs-triage |
2592 | +jammy_linux-azure-fde: needs-triage |
2593 | +kinetic_linux-azure-fde: DNE |
2594 | + |
2595 | +Patches_linux-azure-fde-5.15: |
2596 | +upstream_linux-azure-fde-5.15: needs-triage |
2597 | +trusty_linux-azure-fde-5.15: DNE |
2598 | +xenial_linux-azure-fde-5.15: DNE |
2599 | +bionic_linux-azure-fde-5.15: DNE |
2600 | +focal_linux-azure-fde-5.15: needs-triage |
2601 | +jammy_linux-azure-fde-5.15: DNE |
2602 | +kinetic_linux-azure-fde-5.15: DNE |
2603 | + |
2604 | +Patches_linux-bluefield: |
2605 | +upstream_linux-bluefield: needs-triage |
2606 | +trusty_linux-bluefield: DNE |
2607 | +xenial_linux-bluefield: DNE |
2608 | +bionic_linux-bluefield: DNE |
2609 | +focal_linux-bluefield: needs-triage |
2610 | +jammy_linux-bluefield: DNE |
2611 | +kinetic_linux-bluefield: DNE |
2612 | + |
2613 | +Patches_linux-dell300x: |
2614 | +upstream_linux-dell300x: needs-triage |
2615 | +trusty_linux-dell300x: DNE |
2616 | +xenial_linux-dell300x: DNE |
2617 | +bionic_linux-dell300x: needs-triage |
2618 | +focal_linux-dell300x: DNE |
2619 | +jammy_linux-dell300x: DNE |
2620 | +kinetic_linux-dell300x: DNE |
2621 | + |
2622 | +Patches_linux-azure-edge: |
2623 | +upstream_linux-azure-edge: needs-triage |
2624 | +trusty_linux-azure-edge: DNE |
2625 | +xenial_linux-azure-edge: DNE |
2626 | +bionic_linux-azure-edge: ignored (superseded by linux-azure-5.3) |
2627 | +focal_linux-azure-edge: DNE |
2628 | +jammy_linux-azure-edge: DNE |
2629 | +kinetic_linux-azure-edge: DNE |
2630 | + |
2631 | +Patches_linux-fips: |
2632 | +upstream_linux-fips: needs-triage |
2633 | +trusty_linux-fips: ignored (out of standard support) |
2634 | +xenial_linux-fips: ignored (out of standard support) |
2635 | +bionic_linux-fips: DNE |
2636 | +focal_linux-fips: DNE |
2637 | +jammy_linux-fips: DNE |
2638 | +kinetic_linux-fips: DNE |
2639 | +fips/xenial_linux-fips: needs-triage |
2640 | +fips/bionic_linux-fips: needs-triage |
2641 | +fips/focal_linux-fips: needs-triage |
2642 | +fips-updates/xenial_linux-fips: needs-triage |
2643 | +fips-updates/bionic_linux-fips: needs-triage |
2644 | +fips-updates/focal_linux-fips: needs-triage |
2645 | + |
2646 | +Patches_linux-gcp: |
2647 | +upstream_linux-gcp: needs-triage |
2648 | +esm-infra/xenial_linux-gcp: needs-triage |
2649 | +trusty_linux-gcp: DNE |
2650 | +xenial_linux-gcp: ignored (end of standard support) |
2651 | +bionic_linux-gcp: ignored (superseded by linux-gcp-5.3) |
2652 | +focal_linux-gcp: needs-triage |
2653 | +jammy_linux-gcp: needs-triage |
2654 | +kinetic_linux-gcp: needs-triage |
2655 | +devel_linux-gcp: needs-triage |
2656 | + |
2657 | +Patches_linux-gcp-4.15: |
2658 | +upstream_linux-gcp-4.15: needs-triage |
2659 | +trusty_linux-gcp-4.15: DNE |
2660 | +xenial_linux-gcp-4.15: DNE |
2661 | +bionic_linux-gcp-4.15: needs-triage |
2662 | +focal_linux-gcp-4.15: DNE |
2663 | +jammy_linux-gcp-4.15: DNE |
2664 | +kinetic_linux-gcp-4.15: DNE |
2665 | + |
2666 | +Patches_linux-gcp-5.3: |
2667 | +upstream_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4) |
2668 | +trusty_linux-gcp-5.3: DNE |
2669 | +xenial_linux-gcp-5.3: DNE |
2670 | +bionic_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4) |
2671 | +focal_linux-gcp-5.3: DNE |
2672 | +jammy_linux-gcp-5.3: DNE |
2673 | +kinetic_linux-gcp-5.3: DNE |
2674 | + |
2675 | +Patches_linux-gcp-5.4: |
2676 | +upstream_linux-gcp-5.4: needs-triage |
2677 | +trusty_linux-gcp-5.4: DNE |
2678 | +xenial_linux-gcp-5.4: DNE |
2679 | +bionic_linux-gcp-5.4: needs-triage |
2680 | +focal_linux-gcp-5.4: DNE |
2681 | +jammy_linux-gcp-5.4: DNE |
2682 | +kinetic_linux-gcp-5.4: DNE |
2683 | + |
2684 | +Patches_linux-gcp-5.8: |
2685 | +upstream_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11) |
2686 | +trusty_linux-gcp-5.8: DNE |
2687 | +xenial_linux-gcp-5.8: DNE |
2688 | +bionic_linux-gcp-5.8: DNE |
2689 | +focal_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11) |
2690 | +jammy_linux-gcp-5.8: DNE |
2691 | +kinetic_linux-gcp-5.8: DNE |
2692 | + |
2693 | +Patches_linux-gcp-5.11: |
2694 | +upstream_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13) |
2695 | +trusty_linux-gcp-5.11: DNE |
2696 | +xenial_linux-gcp-5.11: DNE |
2697 | +bionic_linux-gcp-5.11: DNE |
2698 | +focal_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13) |
2699 | +jammy_linux-gcp-5.11: DNE |
2700 | +kinetic_linux-gcp-5.11: DNE |
2701 | + |
2702 | +Patches_linux-gcp-5.13: |
2703 | +upstream_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15) |
2704 | +trusty_linux-gcp-5.13: DNE |
2705 | +xenial_linux-gcp-5.13: DNE |
2706 | +bionic_linux-gcp-5.13: DNE |
2707 | +focal_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15) |
2708 | +jammy_linux-gcp-5.13: DNE |
2709 | +kinetic_linux-gcp-5.13: DNE |
2710 | + |
2711 | +Patches_linux-gcp-5.15: |
2712 | +upstream_linux-gcp-5.15: needs-triage |
2713 | +trusty_linux-gcp-5.15: DNE |
2714 | +xenial_linux-gcp-5.15: DNE |
2715 | +bionic_linux-gcp-5.15: DNE |
2716 | +focal_linux-gcp-5.15: needs-triage |
2717 | +jammy_linux-gcp-5.15: DNE |
2718 | +kinetic_linux-gcp-5.15: DNE |
2719 | + |
2720 | +Patches_linux-gke: |
2721 | +upstream_linux-gke: needs-triage |
2722 | +trusty_linux-gke: DNE |
2723 | +xenial_linux-gke: ignored (reached end of standard support) |
2724 | +bionic_linux-gke: DNE |
2725 | +focal_linux-gke: needs-triage |
2726 | +jammy_linux-gke: needs-triage |
2727 | +kinetic_linux-gke: DNE |
2728 | + |
2729 | +Patches_linux-gke-4.15: |
2730 | +upstream_linux-gke-4.15: needs-triage |
2731 | +trusty_linux-gke-4.15: DNE |
2732 | +xenial_linux-gke-4.15: DNE |
2733 | +bionic_linux-gke-4.15: needs-triage |
2734 | +focal_linux-gke-4.15: DNE |
2735 | +jammy_linux-gke-4.15: DNE |
2736 | +kinetic_linux-gke-4.15: DNE |
2737 | + |
2738 | +Patches_linux-gke-5.0: |
2739 | +upstream_linux-gke-5.0: needs-triage |
2740 | +trusty_linux-gke-5.0: DNE |
2741 | +xenial_linux-gke-5.0: DNE |
2742 | +bionic_linux-gke-5.0: ignored (superseded by linux-gke-5.3) |
2743 | +focal_linux-gke-5.0: DNE |
2744 | +jammy_linux-gke-5.0: DNE |
2745 | +kinetic_linux-gke-5.0: DNE |
2746 | + |
2747 | +Patches_linux-gke-5.3: |
2748 | +upstream_linux-gke-5.3: ignored (superseded by linux-gke-5.4) |
2749 | +trusty_linux-gke-5.3: DNE |
2750 | +xenial_linux-gke-5.3: DNE |
2751 | +bionic_linux-gke-5.3: ignored (superseded by linux-gke-5.4) |
2752 | +focal_linux-gke-5.3: DNE |
2753 | +jammy_linux-gke-5.3: DNE |
2754 | +kinetic_linux-gke-5.3: DNE |
2755 | + |
2756 | +Patches_linux-gke-5.4: |
2757 | +upstream_linux-gke-5.4: needs-triage |
2758 | +trusty_linux-gke-5.4: DNE |
2759 | +xenial_linux-gke-5.4: DNE |
2760 | +bionic_linux-gke-5.4: needs-triage |
2761 | +focal_linux-gke-5.4: DNE |
2762 | +jammy_linux-gke-5.4: DNE |
2763 | +kinetic_linux-gke-5.4: DNE |
2764 | + |
2765 | +Patches_linux-gke-5.15: |
2766 | +upstream_linux-gke-5.15: needs-triage |
2767 | +trusty_linux-gke-5.15: DNE |
2768 | +xenial_linux-gke-5.15: DNE |
2769 | +bionic_linux-gke-5.15: DNE |
2770 | +focal_linux-gke-5.15: needs-triage |
2771 | +jammy_linux-gke-5.15: DNE |
2772 | +kinetic_linux-gke-5.15: DNE |
2773 | + |
2774 | +Patches_linux-gkeop: |
2775 | +upstream_linux-gkeop: needs-triage |
2776 | +trusty_linux-gkeop: DNE |
2777 | +xenial_linux-gkeop: DNE |
2778 | +bionic_linux-gkeop: DNE |
2779 | +focal_linux-gkeop: needs-triage |
2780 | +jammy_linux-gkeop: needs-triage |
2781 | +kinetic_linux-gkeop: DNE |
2782 | + |
2783 | +Patches_linux-gkeop-5.4: |
2784 | +upstream_linux-gkeop-5.4: needs-triage |
2785 | +trusty_linux-gkeop-5.4: DNE |
2786 | +xenial_linux-gkeop-5.4: DNE |
2787 | +bionic_linux-gkeop-5.4: needs-triage |
2788 | +focal_linux-gkeop-5.4: DNE |
2789 | +jammy_linux-gkeop-5.4: DNE |
2790 | +kinetic_linux-gkeop-5.4: DNE |
2791 | + |
2792 | +Patches_linux-ibm: |
2793 | +upstream_linux-ibm: needs-triage |
2794 | +trusty_linux-ibm: DNE |
2795 | +xenial_linux-ibm: DNE |
2796 | +bionic_linux-ibm: DNE |
2797 | +focal_linux-ibm: needs-triage |
2798 | +jammy_linux-ibm: needs-triage |
2799 | +kinetic_linux-ibm: needs-triage |
2800 | +devel_linux-ibm: needs-triage |
2801 | + |
2802 | +Patches_linux-ibm-5.4: |
2803 | +upstream_linux-ibm-5.4: needs-triage |
2804 | +trusty_linux-ibm-5.4: DNE |
2805 | +xenial_linux-ibm-5.4: DNE |
2806 | +bionic_linux-ibm-5.4: needs-triage |
2807 | +focal_linux-ibm-5.4: DNE |
2808 | +jammy_linux-ibm-5.4: DNE |
2809 | +kinetic_linux-ibm-5.4: DNE |
2810 | + |
2811 | +Patches_linux-intel-5.13: |
2812 | +upstream_linux-intel-5.13: needs-triage |
2813 | +trusty_linux-intel-5.13: DNE |
2814 | +xenial_linux-intel-5.13: DNE |
2815 | +bionic_linux-intel-5.13: DNE |
2816 | +focal_linux-intel-5.13: needs-triage |
2817 | +jammy_linux-intel-5.13: DNE |
2818 | +kinetic_linux-intel-5.13: DNE |
2819 | + |
2820 | +Patches_linux-intel-iotg: |
2821 | +upstream_linux-intel-iotg: needs-triage |
2822 | +trusty_linux-intel-iotg: DNE |
2823 | +xenial_linux-intel-iotg: DNE |
2824 | +bionic_linux-intel-iotg: DNE |
2825 | +focal_linux-intel-iotg: DNE |
2826 | +jammy_linux-intel-iotg: needs-triage |
2827 | +kinetic_linux-intel-iotg: DNE |
2828 | + |
2829 | +Patches_linux-intel-iotg-5.15: |
2830 | +upstream_linux-intel-iotg-5.15: needs-triage |
2831 | +trusty_linux-intel-iotg-5.15: DNE |
2832 | +xenial_linux-intel-iotg-5.15: DNE |
2833 | +bionic_linux-intel-iotg-5.15: DNE |
2834 | +focal_linux-intel-iotg-5.15: needs-triage |
2835 | +jammy_linux-intel-iotg-5.15: DNE |
2836 | +kinetic_linux-intel-iotg-5.15: DNE |
2837 | + |
2838 | +Patches_linux-lowlatency: |
2839 | +upstream_linux-lowlatency: needs-triage |
2840 | +trusty_linux-lowlatency: DNE |
2841 | +xenial_linux-lowlatency: DNE |
2842 | +bionic_linux-lowlatency: DNE |
2843 | +focal_linux-lowlatency: DNE |
2844 | +jammy_linux-lowlatency: needs-triage |
2845 | +kinetic_linux-lowlatency: needs-triage |
2846 | +devel_linux-lowlatency: needs-triage |
2847 | + |
2848 | +Patches_linux-lowlatency-hwe-5.15: |
2849 | +upstream_linux-lowlatency-hwe-5.15: needs-triage |
2850 | +trusty_linux-lowlatency-hwe-5.15: DNE |
2851 | +xenial_linux-lowlatency-hwe-5.15: DNE |
2852 | +bionic_linux-lowlatency-hwe-5.15: DNE |
2853 | +focal_linux-lowlatency-hwe-5.15: needs-triage |
2854 | +jammy_linux-lowlatency-hwe-5.15: DNE |
2855 | +kinetic_linux-lowlatency-hwe-5.15: DNE |
2856 | + |
2857 | +Patches_linux-oracle: |
2858 | +upstream_linux-oracle: needs-triage |
2859 | +esm-infra/xenial_linux-oracle: needs-triage |
2860 | +trusty_linux-oracle: DNE |
2861 | +xenial_linux-oracle: ignored (end of standard support) |
2862 | +bionic_linux-oracle: needs-triage |
2863 | +focal_linux-oracle: needs-triage |
2864 | +jammy_linux-oracle: needs-triage |
2865 | +kinetic_linux-oracle: needs-triage |
2866 | +devel_linux-oracle: needs-triage |
2867 | + |
2868 | +Patches_linux-oracle-5.0: |
2869 | +upstream_linux-oracle-5.0: needs-triage |
2870 | +trusty_linux-oracle-5.0: DNE |
2871 | +xenial_linux-oracle-5.0: DNE |
2872 | +bionic_linux-oracle-5.0: ignored (superseded by linux-oracle-5.3) |
2873 | +focal_linux-oracle-5.0: DNE |
2874 | +jammy_linux-oracle-5.0: DNE |
2875 | +kinetic_linux-oracle-5.0: DNE |
2876 | + |
2877 | +Patches_linux-oracle-5.3: |
2878 | +upstream_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4) |
2879 | +trusty_linux-oracle-5.3: DNE |
2880 | +xenial_linux-oracle-5.3: DNE |
2881 | +bionic_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4) |
2882 | +focal_linux-oracle-5.3: DNE |
2883 | +jammy_linux-oracle-5.3: DNE |
2884 | +kinetic_linux-oracle-5.3: DNE |
2885 | + |
2886 | +Patches_linux-oracle-5.4: |
2887 | +upstream_linux-oracle-5.4: needs-triage |
2888 | +trusty_linux-oracle-5.4: DNE |
2889 | +xenial_linux-oracle-5.4: DNE |
2890 | +bionic_linux-oracle-5.4: needs-triage |
2891 | +focal_linux-oracle-5.4: DNE |
2892 | +jammy_linux-oracle-5.4: DNE |
2893 | +kinetic_linux-oracle-5.4: DNE |
2894 | + |
2895 | +Patches_linux-oracle-5.8: |
2896 | +upstream_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11) |
2897 | +trusty_linux-oracle-5.8: DNE |
2898 | +xenial_linux-oracle-5.8: DNE |
2899 | +bionic_linux-oracle-5.8: DNE |
2900 | +focal_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11) |
2901 | +jammy_linux-oracle-5.8: DNE |
2902 | +kinetic_linux-oracle-5.8: DNE |
2903 | + |
2904 | +Patches_linux-oracle-5.11: |
2905 | +upstream_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13) |
2906 | +trusty_linux-oracle-5.11: DNE |
2907 | +xenial_linux-oracle-5.11: DNE |
2908 | +bionic_linux-oracle-5.11: DNE |
2909 | +focal_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13) |
2910 | +jammy_linux-oracle-5.11: DNE |
2911 | +kinetic_linux-oracle-5.11: DNE |
2912 | + |
2913 | +Patches_linux-oracle-5.13: |
2914 | +upstream_linux-oracle-5.13: needs-triage |
2915 | +trusty_linux-oracle-5.13: DNE |
2916 | +xenial_linux-oracle-5.13: DNE |
2917 | +bionic_linux-oracle-5.13: DNE |
2918 | +focal_linux-oracle-5.13: needs-triage |
2919 | +jammy_linux-oracle-5.13: DNE |
2920 | +kinetic_linux-oracle-5.13: DNE |
2921 | + |
2922 | +Patches_linux-oracle-5.15: |
2923 | +upstream_linux-oracle-5.15: needs-triage |
2924 | +trusty_linux-oracle-5.15: DNE |
2925 | +xenial_linux-oracle-5.15: DNE |
2926 | +bionic_linux-oracle-5.15: DNE |
2927 | +focal_linux-oracle-5.15: needs-triage |
2928 | +jammy_linux-oracle-5.15: DNE |
2929 | +kinetic_linux-oracle-5.15: DNE |
2930 | + |
2931 | +Patches_linux-oem: |
2932 | +upstream_linux-oem: needs-triage |
2933 | +trusty_linux-oem: DNE |
2934 | +xenial_linux-oem: ignored (superseded by linux-hwe) |
2935 | +bionic_linux-oem: needs-triage |
2936 | +focal_linux-oem: DNE |
2937 | +jammy_linux-oem: DNE |
2938 | +kinetic_linux-oem: DNE |
2939 | + |
2940 | +Patches_linux-oem-5.6: |
2941 | +upstream_linux-oem-5.6: needs-triage |
2942 | +trusty_linux-oem-5.6: DNE |
2943 | +xenial_linux-oem-5.6: DNE |
2944 | +bionic_linux-oem-5.6: DNE |
2945 | +focal_linux-oem-5.6: needs-triage |
2946 | +jammy_linux-oem-5.6: DNE |
2947 | +kinetic_linux-oem-5.6: DNE |
2948 | + |
2949 | +Patches_linux-oem-5.10: |
2950 | +upstream_linux-oem-5.10: needs-triage |
2951 | +trusty_linux-oem-5.10: DNE |
2952 | +xenial_linux-oem-5.10: DNE |
2953 | +bionic_linux-oem-5.10: DNE |
2954 | +focal_linux-oem-5.10: needs-triage |
2955 | +jammy_linux-oem-5.10: DNE |
2956 | +kinetic_linux-oem-5.10: DNE |
2957 | + |
2958 | +Patches_linux-oem-5.13: |
2959 | +upstream_linux-oem-5.13: ignored (superseded by linux-oem-5.14) |
2960 | +trusty_linux-oem-5.13: DNE |
2961 | +xenial_linux-oem-5.13: DNE |
2962 | +bionic_linux-oem-5.13: DNE |
2963 | +focal_linux-oem-5.13: ignored (superseded by linux-oem-5.14) |
2964 | +jammy_linux-oem-5.13: DNE |
2965 | +kinetic_linux-oem-5.13: DNE |
2966 | + |
2967 | +Patches_linux-oem-5.14: |
2968 | +upstream_linux-oem-5.14: needs-triage |
2969 | +trusty_linux-oem-5.14: DNE |
2970 | +xenial_linux-oem-5.14: DNE |
2971 | +bionic_linux-oem-5.14: DNE |
2972 | +focal_linux-oem-5.14: needs-triage |
2973 | +jammy_linux-oem-5.14: DNE |
2974 | +kinetic_linux-oem-5.14: DNE |
2975 | + |
2976 | +Patches_linux-oem-5.17: |
2977 | +upstream_linux-oem-5.17: needs-triage |
2978 | +trusty_linux-oem-5.17: DNE |
2979 | +xenial_linux-oem-5.17: DNE |
2980 | +bionic_linux-oem-5.17: DNE |
2981 | +focal_linux-oem-5.17: DNE |
2982 | +jammy_linux-oem-5.17: needs-triage |
2983 | +kinetic_linux-oem-5.17: needs-triage |
2984 | +devel_linux-oem-5.17: needs-triage |
2985 | + |
2986 | +Patches_linux-oem-osp1: |
2987 | +upstream_linux-oem-osp1: needs-triage |
2988 | +trusty_linux-oem-osp1: DNE |
2989 | +xenial_linux-oem-osp1: DNE |
2990 | +bionic_linux-oem-osp1: needs-triage |
2991 | +focal_linux-oem-osp1: DNE |
2992 | +jammy_linux-oem-osp1: DNE |
2993 | +kinetic_linux-oem-osp1: DNE |
2994 | + |
2995 | +Patches_linux-raspi: |
2996 | +upstream_linux-raspi: needs-triage |
2997 | +trusty_linux-raspi: DNE |
2998 | +xenial_linux-raspi: DNE |
2999 | +bionic_linux-raspi: DNE |
3000 | +focal_linux-raspi: needs-triage |
3001 | +jammy_linux-raspi: needs-triage |
3002 | +kinetic_linux-raspi: needs-triage |
3003 | +devel_linux-raspi: needs-triage |
3004 | + |
3005 | +Patches_linux-raspi2: |
3006 | +upstream_linux-raspi2: needs-triage |
3007 | +trusty_linux-raspi2: DNE |
3008 | +xenial_linux-raspi2: ignored (end of standard support) |
3009 | +bionic_linux-raspi2: needs-triage |
3010 | +focal_linux-raspi2: ignored (replaced by linux-raspi) |
3011 | +jammy_linux-raspi2: DNE |
3012 | +kinetic_linux-raspi2: DNE |
3013 | + |
3014 | +Patches_linux-raspi2-5.3: |
3015 | +upstream_linux-raspi2-5.3: ignored (superseded by linux-raspi2-5.4) |
3016 | +trusty_linux-raspi2-5.3: DNE |
3017 | +xenial_linux-raspi2-5.3: DNE |
3018 | +bionic_linux-raspi2-5.3: ignored (superseded by linux-raspi-5.4) |
3019 | +focal_linux-raspi2-5.3: DNE |
3020 | +jammy_linux-raspi2-5.3: DNE |
3021 | +kinetic_linux-raspi2-5.3: DNE |
3022 | + |
3023 | +Patches_linux-raspi-5.4: |
3024 | +upstream_linux-raspi-5.4: needs-triage |
3025 | +trusty_linux-raspi-5.4: DNE |
3026 | +xenial_linux-raspi-5.4: DNE |
3027 | +bionic_linux-raspi-5.4: needs-triage |
3028 | +focal_linux-raspi-5.4: DNE |
3029 | +jammy_linux-raspi-5.4: DNE |
3030 | +kinetic_linux-raspi-5.4: DNE |
3031 | + |
3032 | +Patches_linux-riscv: |
3033 | +upstream_linux-riscv: needs-triage |
3034 | +trusty_linux-riscv: DNE |
3035 | +xenial_linux-riscv: DNE |
3036 | +bionic_linux-riscv: DNE |
3037 | +focal_linux-riscv: ignored (superseded by linux-riscv-5.8) |
3038 | +jammy_linux-riscv: needs-triage |
3039 | +kinetic_linux-riscv: needs-triage |
3040 | +devel_linux-riscv: needs-triage |
3041 | + |
3042 | +Patches_linux-riscv-5.8: |
3043 | +upstream_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11) |
3044 | +trusty_linux-riscv-5.8: DNE |
3045 | +xenial_linux-riscv-5.8: DNE |
3046 | +bionic_linux-riscv-5.8: DNE |
3047 | +focal_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11) |
3048 | +jammy_linux-riscv-5.8: DNE |
3049 | +kinetic_linux-riscv-5.8: DNE |
3050 | + |
3051 | +Patches_linux-riscv-5.11: |
3052 | +upstream_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13) |
3053 | +trusty_linux-riscv-5.11: DNE |
3054 | +xenial_linux-riscv-5.11: DNE |
3055 | +bionic_linux-riscv-5.11: DNE |
3056 | +focal_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13) |
3057 | +jammy_linux-riscv-5.11: DNE |
3058 | +kinetic_linux-riscv-5.11: DNE |
3059 | + |
3060 | +Patches_linux-snapdragon: |
3061 | +upstream_linux-snapdragon: needs-triage |
3062 | +trusty_linux-snapdragon: DNE |
3063 | +xenial_linux-snapdragon: ignored (end of standard support) |
3064 | +bionic_linux-snapdragon: needs-triage |
3065 | +focal_linux-snapdragon: DNE |
3066 | +jammy_linux-snapdragon: DNE |
3067 | +kinetic_linux-snapdragon: DNE |
3068 | diff --git a/active/CVE-2022-23467 b/active/CVE-2022-23467 |
3069 | new file mode 100644 |
3070 | index 0000000..d5b7d96 |
3071 | --- /dev/null |
3072 | +++ b/active/CVE-2022-23467 |
3073 | @@ -0,0 +1,33 @@ |
3074 | +Candidate: CVE-2022-23467 |
3075 | +PublicDate: 2022-12-06 |
3076 | +References: |
3077 | + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23467 |
3078 | + https://github.com/openrazer/openrazer/security/advisories/GHSA-39hg-jvc9-fg7h |
3079 | + https://github.com/openrazer/openrazer/commit/33aa7f07d54ae066f201c6d298cb4a2181cb90e6 |
3080 | +Description: |
3081 | + OpenRazer is an open source driver and user-space daemon to control Razer |
3082 | + device lighting and other features on GNU/Linux. Using a modified USB |
3083 | + device an attacker can leak stack addresses of the |
3084 | + `razer_attr_read_dpi_stages`, potentially bypassing KASLR. To exploit this |
3085 | + vulnerability an attacker would need to access to a users keyboard or mouse |
3086 | + or would need to convince a user to use a modified device. The issue has |
3087 | + been patched in v3.5.1. Users are advised to upgrade and should be reminded |
3088 | + not to plug in unknown USB devices. |
3089 | +Ubuntu-Description: |
3090 | +Notes: |
3091 | +Mitigation: |
3092 | +Bugs: |
3093 | +Priority: low |
3094 | +Discovered-by: |
3095 | +Assigned-to: |
3096 | +CVSS: |
3097 | + |
3098 | +Patches_openrazer: |
3099 | +upstream_openrazer: needs-triage |
3100 | +trusty_openrazer: ignored (out of standard support) |
3101 | +xenial_openrazer: ignored (out of standard support) |
3102 | +bionic_openrazer: DNE |
3103 | +focal_openrazer: needs-triage |
3104 | +jammy_openrazer: needs-triage |
3105 | +kinetic_openrazer: needs-triage |
3106 | +devel_openrazer: needs-triage |
3107 | diff --git a/active/CVE-2022-37325 b/active/CVE-2022-37325 |
3108 | new file mode 100644 |
3109 | index 0000000..6a034a4 |
3110 | --- /dev/null |
3111 | +++ b/active/CVE-2022-37325 |
3112 | @@ -0,0 +1,28 @@ |
3113 | +Candidate: CVE-2022-37325 |
3114 | +PublicDate: 2022-12-06 |
3115 | +References: |
3116 | + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325 |
3117 | + https://downloads.asterisk.org/pub/security/AST-2022-007.html |
3118 | +Description: |
3119 | + In Sangoma Asterisk through 16.28.0, 17.x and 18.x through 18.14.0, and |
3120 | + 19.x through 19.6.0, an incoming Setup message to |
3121 | + addons/ooh323c/src/ooq931.c with a malformed Calling or Called Party IE can |
3122 | + cause a crash. |
3123 | +Ubuntu-Description: |
3124 | +Notes: |
3125 | +Mitigation: |
3126 | +Bugs: |
3127 | +Priority: medium |
3128 | +Discovered-by: |
3129 | +Assigned-to: |
3130 | +CVSS: |
3131 | + |
3132 | +Patches_asterisk: |
3133 | +upstream_asterisk: needs-triage |
3134 | +trusty_asterisk: ignored (out of standard support) |
3135 | +xenial_asterisk: ignored (out of standard support) |
3136 | +bionic_asterisk: needs-triage |
3137 | +focal_asterisk: needs-triage |
3138 | +jammy_asterisk: needs-triage |
3139 | +kinetic_asterisk: needs-triage |
3140 | +devel_asterisk: needs-triage |
3141 | diff --git a/active/CVE-2022-38533 b/active/CVE-2022-38533 |
3142 | index c8908b2..52f923d 100644 |
3143 | --- a/active/CVE-2022-38533 |
3144 | +++ b/active/CVE-2022-38533 |
3145 | @@ -1,7 +1,9 @@ |
3146 | +PublicDateAtUSN: 2022-08-26 00:15:00 UTC |
3147 | Candidate: CVE-2022-38533 |
3148 | PublicDate: 2022-08-26 00:15:00 UTC |
3149 | References: |
3150 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38533 |
3151 | + https://ubuntu.com/security/notices/USN-5762-1 |
3152 | Description: |
3153 | In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error |
3154 | function bfd_getl32 when called from the strip_main function in strip-new |
3155 | @@ -23,11 +25,11 @@ Patches_binutils: |
3156 | upstream: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ef186fe54aa6d281a3ff8a9528417e5cc614c797 |
3157 | upstream_binutils: pending (2.40) |
3158 | trusty/esm_binutils: needed |
3159 | -esm-infra/xenial_binutils: needed |
3160 | +esm-infra/xenial_binutils: released (2.26.1-1ubuntu1~16.04.8+esm5) |
3161 | trusty_binutils: ignored (out of standard support) |
3162 | xenial_binutils: ignored (out of standard support) |
3163 | -bionic_binutils: needed |
3164 | -focal_binutils: needed |
3165 | -jammy_binutils: needed |
3166 | -kinetic_binutils: needed |
3167 | +bionic_binutils: released (2.30-21ubuntu1~18.04.8) |
3168 | +focal_binutils: released (2.34-6ubuntu1.4) |
3169 | +jammy_binutils: released (2.38-4ubuntu2.1) |
3170 | +kinetic_binutils: released (2.39-3ubuntu1.1) |
3171 | devel_binutils: needed |
3172 | diff --git a/active/CVE-2022-40303 b/active/CVE-2022-40303 |
3173 | index c1766be..e153bb7 100644 |
3174 | --- a/active/CVE-2022-40303 |
3175 | +++ b/active/CVE-2022-40303 |
3176 | @@ -4,6 +4,7 @@ PublicDate: 2022-11-23 00:15:00 UTC |
3177 | References: |
3178 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40303 |
3179 | https://ubuntu.com/security/notices/USN-5760-1 |
3180 | + https://ubuntu.com/security/notices/USN-5760-2 |
3181 | Description: |
3182 | An issue was discovered in libxml2 before 2.10.3. When parsing a |
3183 | multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, |
3184 | @@ -24,7 +25,7 @@ CVSS: |
3185 | Patches_libxml2: |
3186 | upstream: https://gitlab.gnome.org/GNOME/libxml2/-/commit/c846986356fc149915a74972bf198abc266bc2c0 |
3187 | upstream_libxml2: released (2.10.3) |
3188 | -esm-infra/xenial_libxml2: needed |
3189 | +esm-infra/xenial_libxml2: released (2.9.3+dfsg1-1ubuntu0.7+esm4) |
3190 | trusty_libxml2: ignored (out of standard support) |
3191 | xenial_libxml2: ignored (out of standard support) |
3192 | bionic_libxml2: released (2.9.4+dfsg1-6.1ubuntu1.8) |
3193 | @@ -32,4 +33,4 @@ focal_libxml2: released (2.9.10+dfsg-5ubuntu0.20.04.5) |
3194 | jammy_libxml2: released (2.9.13+dfsg-1ubuntu0.2) |
3195 | kinetic_libxml2: released (2.9.14+dfsg-1ubuntu0.1) |
3196 | devel_libxml2: needed |
3197 | -trusty/esm_libxml2: needed |
3198 | +trusty/esm_libxml2: released (2.9.1+dfsg1-3ubuntu4.13+esm4) |
3199 | diff --git a/active/CVE-2022-40304 b/active/CVE-2022-40304 |
3200 | index d2506f2..8373f58 100644 |
3201 | --- a/active/CVE-2022-40304 |
3202 | +++ b/active/CVE-2022-40304 |
3203 | @@ -4,6 +4,7 @@ PublicDate: 2022-11-23 18:15:00 UTC |
3204 | References: |
3205 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40304 |
3206 | https://ubuntu.com/security/notices/USN-5760-1 |
3207 | + https://ubuntu.com/security/notices/USN-5760-2 |
3208 | Description: |
3209 | An issue was discovered in libxml2 before 2.10.3. Certain invalid XML |
3210 | entity definitions can corrupt a hash table key, potentially leading to |
3211 | @@ -22,7 +23,7 @@ CVSS: |
3212 | Patches_libxml2: |
3213 | upstream: https://gitlab.gnome.org/GNOME/libxml2/-/commit/1b41ec4e9433b05bb0376be4725804c54ef1d80b |
3214 | upstream_libxml2: released (2.10.3) |
3215 | -esm-infra/xenial_libxml2: needed |
3216 | +esm-infra/xenial_libxml2: released (2.9.3+dfsg1-1ubuntu0.7+esm4) |
3217 | trusty_libxml2: ignored (out of standard support) |
3218 | xenial_libxml2: ignored (out of standard support) |
3219 | bionic_libxml2: released (2.9.4+dfsg1-6.1ubuntu1.8) |
3220 | @@ -30,4 +31,4 @@ focal_libxml2: released (2.9.10+dfsg-5ubuntu0.20.04.5) |
3221 | jammy_libxml2: released (2.9.13+dfsg-1ubuntu0.2) |
3222 | kinetic_libxml2: released (2.9.14+dfsg-1ubuntu0.1) |
3223 | devel_libxml2: needs-triage |
3224 | -trusty/esm_libxml2: needed |
3225 | +trusty/esm_libxml2: released (2.9.1+dfsg1-3ubuntu4.13+esm4) |
3226 | diff --git a/active/CVE-2022-4170 b/active/CVE-2022-4170 |
3227 | new file mode 100644 |
3228 | index 0000000..eef4d0d |
3229 | --- /dev/null |
3230 | +++ b/active/CVE-2022-4170 |
3231 | @@ -0,0 +1,27 @@ |
3232 | +Candidate: CVE-2022-4170 |
3233 | +PublicDate: 2022-12-06 |
3234 | +References: |
3235 | + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4170 |
3236 | + https://www.openwall.com/lists/oss-security/2022/12/05/1 |
3237 | + http://cvs.schmorp.de/rxvt-unicode/src/perl/background?r1=1.105&r2=1.109 |
3238 | +Description: |
3239 | + [Unknown description] |
3240 | +Ubuntu-Description: |
3241 | +Notes: |
3242 | +Mitigation: |
3243 | +Bugs: |
3244 | + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025489 |
3245 | +Priority: medium |
3246 | +Discovered-by: |
3247 | +Assigned-to: |
3248 | +CVSS: |
3249 | + |
3250 | +Patches_rxvt-unicode: |
3251 | +upstream_rxvt-unicode: needs-triage |
3252 | +trusty_rxvt-unicode: ignored (out of standard support) |
3253 | +xenial_rxvt-unicode: ignored (out of standard support) |
3254 | +bionic_rxvt-unicode: needs-triage |
3255 | +focal_rxvt-unicode: needs-triage |
3256 | +jammy_rxvt-unicode: needs-triage |
3257 | +kinetic_rxvt-unicode: needs-triage |
3258 | +devel_rxvt-unicode: needs-triage |
3259 | diff --git a/active/CVE-2022-42705 b/active/CVE-2022-42705 |
3260 | new file mode 100644 |
3261 | index 0000000..89a63e2 |
3262 | --- /dev/null |
3263 | +++ b/active/CVE-2022-42705 |
3264 | @@ -0,0 +1,29 @@ |
3265 | +Candidate: CVE-2022-42705 |
3266 | +PublicDate: 2022-12-06 |
3267 | +References: |
3268 | + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705 |
3269 | + https://downloads.asterisk.org/pub/security/AST-2022-008.html |
3270 | +Description: |
3271 | + A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14, |
3272 | + 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to |
3273 | + crash Asterisk (denial of service) by performing activity on a subscription |
3274 | + via a reliable transport at the same time that Asterisk is also performing |
3275 | + activity on that subscription. |
3276 | +Ubuntu-Description: |
3277 | +Notes: |
3278 | +Mitigation: |
3279 | +Bugs: |
3280 | +Priority: medium |
3281 | +Discovered-by: |
3282 | +Assigned-to: |
3283 | +CVSS: |
3284 | + |
3285 | +Patches_asterisk: |
3286 | +upstream_asterisk: needs-triage |
3287 | +trusty_asterisk: ignored (out of standard support) |
3288 | +xenial_asterisk: ignored (out of standard support) |
3289 | +bionic_asterisk: needs-triage |
3290 | +focal_asterisk: needs-triage |
3291 | +jammy_asterisk: needs-triage |
3292 | +kinetic_asterisk: needs-triage |
3293 | +devel_asterisk: needs-triage |
3294 | diff --git a/active/CVE-2022-42706 b/active/CVE-2022-42706 |
3295 | new file mode 100644 |
3296 | index 0000000..65cc814 |
3297 | --- /dev/null |
3298 | +++ b/active/CVE-2022-42706 |
3299 | @@ -0,0 +1,29 @@ |
3300 | +Candidate: CVE-2022-42706 |
3301 | +PublicDate: 2022-12-06 |
3302 | +References: |
3303 | + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706 |
3304 | + https://downloads.asterisk.org/pub/security/AST-2022-009.html |
3305 | +Description: |
3306 | + An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 |
3307 | + through 18.14, 19 through 19.6, and certified through 18.9-cert1. |
3308 | + GetConfig, via Asterisk Manager Interface, allows a connected application |
3309 | + to access files outside of the asterisk configuration directory, aka |
3310 | + Directory Traversal. |
3311 | +Ubuntu-Description: |
3312 | +Notes: |
3313 | +Mitigation: |
3314 | +Bugs: |
3315 | +Priority: medium |
3316 | +Discovered-by: |
3317 | +Assigned-to: |
3318 | +CVSS: |
3319 | + |
3320 | +Patches_asterisk: |
3321 | +upstream_asterisk: needs-triage |
3322 | +trusty_asterisk: ignored (out of standard support) |
3323 | +xenial_asterisk: ignored (out of standard support) |
3324 | +bionic_asterisk: needs-triage |
3325 | +focal_asterisk: needs-triage |
3326 | +jammy_asterisk: needs-triage |
3327 | +kinetic_asterisk: needs-triage |
3328 | +devel_asterisk: needs-triage |
3329 | diff --git a/active/CVE-2022-42919 b/active/CVE-2022-42919 |
3330 | index e25c604..c6b41d6 100644 |
3331 | --- a/active/CVE-2022-42919 |
3332 | +++ b/active/CVE-2022-42919 |
3333 | @@ -122,4 +122,4 @@ bionic_python3.11: DNE |
3334 | focal_python3.11: DNE |
3335 | jammy_python3.11: needed |
3336 | kinetic_python3.11: needed |
3337 | -devel_python3.11: needed |
3338 | +devel_python3.11: not-affected (3.11.0-3) |
3339 | diff --git a/active/CVE-2022-4292 b/active/CVE-2022-4292 |
3340 | new file mode 100644 |
3341 | index 0000000..f641a65 |
3342 | --- /dev/null |
3343 | +++ b/active/CVE-2022-4292 |
3344 | @@ -0,0 +1,29 @@ |
3345 | +Candidate: CVE-2022-4292 |
3346 | +PublicDate: 2022-12-06 |
3347 | +References: |
3348 | + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4292 |
3349 | + https://huntr.dev/bounties/da3d4c47-e57a-451e-993d-9df0ed31f57b |
3350 | + https://github.com/vim/vim/commit/c3d27ada14acd02db357f2d16347acc22cb17e93 (v9.0.0882) |
3351 | + https://github.com/vim/vim/commit/c3d27ada14acd02db357f2d16347acc22cb17e93 |
3352 | +Description: |
3353 | + Use After Free in GitHub repository vim/vim prior to 9.0.0882. |
3354 | +Ubuntu-Description: |
3355 | +Notes: |
3356 | +Mitigation: |
3357 | +Bugs: |
3358 | +Priority: low |
3359 | +Discovered-by: |
3360 | +Assigned-to: |
3361 | +CVSS: |
3362 | + |
3363 | +Patches_vim: |
3364 | +upstream_vim: needs-triage |
3365 | +esm-infra/xenial_vim: needs-triage |
3366 | +trusty_vim: ignored (out of standard support) |
3367 | +xenial_vim: ignored (out of standard support) |
3368 | +bionic_vim: needs-triage |
3369 | +focal_vim: needs-triage |
3370 | +jammy_vim: needs-triage |
3371 | +kinetic_vim: needs-triage |
3372 | +trusty/esm_vim: needs-triage |
3373 | +devel_vim: needs-triage |
3374 | diff --git a/active/CVE-2022-4293 b/active/CVE-2022-4293 |
3375 | new file mode 100644 |
3376 | index 0000000..9a6dab6 |
3377 | --- /dev/null |
3378 | +++ b/active/CVE-2022-4293 |
3379 | @@ -0,0 +1,30 @@ |
3380 | +Candidate: CVE-2022-4293 |
3381 | +PublicDate: 2022-12-06 |
3382 | +References: |
3383 | + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4293 |
3384 | + https://huntr.dev/bounties/385a835f-6e33-4d00-acce-ac99f3939143 |
3385 | + https://github.com/vim/vim/commit/cdef1cefa2a440911c727558562f83ed9b00e16b (v9.0.0804) |
3386 | + https://github.com/vim/vim/commit/cdef1cefa2a440911c727558562f83ed9b00e16b |
3387 | +Description: |
3388 | + Floating Point Comparison with Incorrect Operator in GitHub repository |
3389 | + vim/vim prior to 9.0.0804. |
3390 | +Ubuntu-Description: |
3391 | +Notes: |
3392 | +Mitigation: |
3393 | +Bugs: |
3394 | +Priority: low |
3395 | +Discovered-by: |
3396 | +Assigned-to: |
3397 | +CVSS: |
3398 | + |
3399 | +Patches_vim: |
3400 | +upstream_vim: released (2:9.0.0813-1) |
3401 | +esm-infra/xenial_vim: needs-triage |
3402 | +trusty_vim: ignored (out of standard support) |
3403 | +xenial_vim: ignored (out of standard support) |
3404 | +bionic_vim: needs-triage |
3405 | +focal_vim: needs-triage |
3406 | +jammy_vim: needs-triage |
3407 | +kinetic_vim: needs-triage |
3408 | +trusty/esm_vim: needs-triage |
3409 | +devel_vim: needs-triage |
3410 | diff --git a/active/CVE-2022-43497 b/active/CVE-2022-43497 |
3411 | new file mode 100644 |
3412 | index 0000000..886976d |
3413 | --- /dev/null |
3414 | +++ b/active/CVE-2022-43497 |
3415 | @@ -0,0 +1,28 @@ |
3416 | +Candidate: CVE-2022-43497 |
3417 | +PublicDate: 2022-12-06 |
3418 | +References: |
3419 | + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43497 |
3420 | + https://wordpress.org/news/2022/10/wordpress-6-0-3-security-release/ |
3421 | + https://jvn.jp/en/jp/JVN09409909/index.html |
3422 | + https://wordpress.org/download/ |
3423 | +Description: |
3424 | + Cross-site scripting vulnerability in WordPress versions prior to 6.0.3 |
3425 | + allows a remote unauthenticated attacker to inject an arbitrary script . |
3426 | +Ubuntu-Description: |
3427 | +Notes: |
3428 | +Mitigation: |
3429 | +Bugs: |
3430 | +Priority: medium |
3431 | +Discovered-by: |
3432 | +Assigned-to: |
3433 | +CVSS: |
3434 | + |
3435 | +Patches_wordpress: |
3436 | +upstream_wordpress: needs-triage |
3437 | +trusty_wordpress: ignored (out of standard support) |
3438 | +xenial_wordpress: ignored (out of standard support) |
3439 | +bionic_wordpress: needs-triage |
3440 | +focal_wordpress: needs-triage |
3441 | +jammy_wordpress: needs-triage |
3442 | +kinetic_wordpress: needs-triage |
3443 | +devel_wordpress: needs-triage |
3444 | diff --git a/active/CVE-2022-43500 b/active/CVE-2022-43500 |
3445 | new file mode 100644 |
3446 | index 0000000..f5064e8 |
3447 | --- /dev/null |
3448 | +++ b/active/CVE-2022-43500 |
3449 | @@ -0,0 +1,28 @@ |
3450 | +Candidate: CVE-2022-43500 |
3451 | +PublicDate: 2022-12-06 |
3452 | +References: |
3453 | + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43500 |
3454 | + https://wordpress.org/news/2022/10/wordpress-6-0-3-security-release/ |
3455 | + https://jvn.jp/en/jp/JVN09409909/index.html |
3456 | + https://wordpress.org/download/ |
3457 | +Description: |
3458 | + Cross-site scripting vulnerability in WordPress versions prior to 6.0.3 |
3459 | + allows a remote unauthenticated attacker to inject an arbitrary script . |
3460 | +Ubuntu-Description: |
3461 | +Notes: |
3462 | +Mitigation: |
3463 | +Bugs: |
3464 | +Priority: medium |
3465 | +Discovered-by: |
3466 | +Assigned-to: |
3467 | +CVSS: |
3468 | + |
3469 | +Patches_wordpress: |
3470 | +upstream_wordpress: needs-triage |
3471 | +trusty_wordpress: ignored (out of standard support) |
3472 | +xenial_wordpress: ignored (out of standard support) |
3473 | +bionic_wordpress: needs-triage |
3474 | +focal_wordpress: needs-triage |
3475 | +jammy_wordpress: needs-triage |
3476 | +kinetic_wordpress: needs-triage |
3477 | +devel_wordpress: needs-triage |
3478 | diff --git a/active/CVE-2022-43504 b/active/CVE-2022-43504 |
3479 | new file mode 100644 |
3480 | index 0000000..fceca9e |
3481 | --- /dev/null |
3482 | +++ b/active/CVE-2022-43504 |
3483 | @@ -0,0 +1,29 @@ |
3484 | +Candidate: CVE-2022-43504 |
3485 | +PublicDate: 2022-12-06 |
3486 | +References: |
3487 | + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43504 |
3488 | + https://wordpress.org/news/2022/10/wordpress-6-0-3-security-release/ |
3489 | + https://jvn.jp/en/jp/JVN09409909/index.html |
3490 | + https://wordpress.org/download/ |
3491 | +Description: |
3492 | + Improper authentication vulnerability in WordPress versions prior to 6.0.3 |
3493 | + allows a remote unauthenticated attacker to obtain the email address of the |
3494 | + user who posted a blog using the WordPress Post by Email Feature. |
3495 | +Ubuntu-Description: |
3496 | +Notes: |
3497 | +Mitigation: |
3498 | +Bugs: |
3499 | +Priority: low |
3500 | +Discovered-by: |
3501 | +Assigned-to: |
3502 | +CVSS: |
3503 | + |
3504 | +Patches_wordpress: |
3505 | +upstream_wordpress: needs-triage |
3506 | +trusty_wordpress: ignored (out of standard support) |
3507 | +xenial_wordpress: ignored (out of standard support) |
3508 | +bionic_wordpress: needs-triage |
3509 | +focal_wordpress: needs-triage |
3510 | +jammy_wordpress: needs-triage |
3511 | +kinetic_wordpress: needs-triage |
3512 | +devel_wordpress: needs-triage |
3513 | diff --git a/active/CVE-2022-43515 b/active/CVE-2022-43515 |
3514 | new file mode 100644 |
3515 | index 0000000..63eaca3 |
3516 | --- /dev/null |
3517 | +++ b/active/CVE-2022-43515 |
3518 | @@ -0,0 +1,31 @@ |
3519 | +Candidate: CVE-2022-43515 |
3520 | +PublicDate: 2022-12-06 |
3521 | +References: |
3522 | + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43515 |
3523 | + https://support.zabbix.com/browse/ZBXSEC-125 |
3524 | +Description: |
3525 | + Zabbix Frontend provides a feature that allows admins to maintain the |
3526 | + installation and ensure that only certain IP addresses can access it. In |
3527 | + this way, any user will not be able to access the Zabbix Frontend while it |
3528 | + is being maintained and possible sensitive data will be prevented from |
3529 | + being disclosed. An attacker can bypass this protection and access the |
3530 | + instance using IP address not listed in the defined range. |
3531 | +Ubuntu-Description: |
3532 | +Notes: |
3533 | +Mitigation: |
3534 | +Bugs: |
3535 | +Priority: medium |
3536 | +Discovered-by: |
3537 | +Assigned-to: |
3538 | +CVSS: |
3539 | + |
3540 | +Patches_zabbix: |
3541 | +upstream_zabbix: needs-triage |
3542 | +trusty_zabbix: ignored (out of standard support) |
3543 | +xenial_zabbix: ignored (out of standard support) |
3544 | +bionic_zabbix: needs-triage |
3545 | +focal_zabbix: needs-triage |
3546 | +jammy_zabbix: needs-triage |
3547 | +kinetic_zabbix: needs-triage |
3548 | +trusty/esm_zabbix: needs-triage |
3549 | +devel_zabbix: needs-triage |
3550 | diff --git a/active/CVE-2022-45283 b/active/CVE-2022-45283 |
3551 | new file mode 100644 |
3552 | index 0000000..d6b9b1f |
3553 | --- /dev/null |
3554 | +++ b/active/CVE-2022-45283 |
3555 | @@ -0,0 +1,27 @@ |
3556 | +Candidate: CVE-2022-45283 |
3557 | +PublicDate: 2022-12-06 |
3558 | +References: |
3559 | + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45283 |
3560 | + https://github.com/gpac/gpac/issues/2295 |
3561 | +Description: |
3562 | + GPAC MP4box v2.0.0 was discovered to contain a stack overflow in the |
3563 | + smil_parse_time_list parameter at /scenegraph/svg_attributes.c. |
3564 | +Ubuntu-Description: |
3565 | +Notes: |
3566 | +Mitigation: |
3567 | +Bugs: |
3568 | +Priority: medium |
3569 | +Discovered-by: |
3570 | +Assigned-to: |
3571 | +CVSS: |
3572 | + |
3573 | +Patches_gpac: |
3574 | +upstream_gpac: needs-triage |
3575 | +trusty_gpac: ignored (out of standard support) |
3576 | +xenial_gpac: ignored (out of standard support) |
3577 | +bionic_gpac: needs-triage |
3578 | +focal_gpac: needs-triage |
3579 | +jammy_gpac: needs-triage |
3580 | +kinetic_gpac: needs-triage |
3581 | +trusty/esm_gpac: needs-triage |
3582 | +devel_gpac: needs-triage |
3583 | diff --git a/active/CVE-2022-46169 b/active/CVE-2022-46169 |
3584 | new file mode 100644 |
3585 | index 0000000..f5b58f4 |
3586 | --- /dev/null |
3587 | +++ b/active/CVE-2022-46169 |
3588 | @@ -0,0 +1,78 @@ |
3589 | +Candidate: CVE-2022-46169 |
3590 | +PublicDate: 2022-12-06 |
3591 | +References: |
3592 | + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46169 |
3593 | + https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf |
3594 | + https://github.com/Cacti/cacti/commit/b43f13ae7f1e6bfe4e8e56a80a7cd867cf2db52b |
3595 | + https://github.com/Cacti/cacti/commit/a8d59e8fa5f0054aa9c6981b1cbe30ef0e2a0ec9 |
3596 | + https://github.com/Cacti/cacti/commit/7f0e16312dd5ce20f93744ef8b9c3b0f1ece2216 |
3597 | +Description: |
3598 | + Cacti is an open source platform which provides a robust and extensible |
3599 | + operational monitoring and fault management framework for users. In |
3600 | + affected versions a command injection vulnerability allows an |
3601 | + unauthenticated user to execute arbitrary code on a server running Cacti, |
3602 | + if a specific data source was selected for any monitored device. The |
3603 | + vulnerability resides in the `remote_agent.php` file. This file can be |
3604 | + accessed without authentication. This function retrieves the IP address of |
3605 | + the client via `get_client_addr` and resolves this IP address to the |
3606 | + corresponding hostname via `gethostbyaddr`. After this, it is verified that |
3607 | + an entry within the `poller` table exists, where the hostname corresponds |
3608 | + to the resolved hostname. If such an entry was found, the function returns |
3609 | + `true` and the client is authorized. This authorization can be bypassed due |
3610 | + to the implementation of the `get_client_addr` function. The function is |
3611 | + defined in the file `lib/functions.php` and checks serval `$_SERVER` |
3612 | + variables to determine the IP address of the client. The variables |
3613 | + beginning with `HTTP_` can be arbitrarily set by an attacker. Since there |
3614 | + is a default entry in the `poller` table with the hostname of the server |
3615 | + running Cacti, an attacker can bypass the authentication e.g. by providing |
3616 | + the header `Forwarded-For: <TARGETIP>`. This way the function |
3617 | + `get_client_addr` returns the IP address of the server running Cacti. The |
3618 | + following call to `gethostbyaddr` will resolve this IP address to the |
3619 | + hostname of the server, which will pass the `poller` hostname check because |
3620 | + of the default entry. After the authorization of the `remote_agent.php` |
3621 | + file is bypassed, an attacker can trigger different actions. One of these |
3622 | + actions is called `polldata`. The called function `poll_for_data` retrieves |
3623 | + a few request parameters and loads the corresponding `poller_item` entries |
3624 | + from the database. If the `action` of a `poller_item` equals |
3625 | + `POLLER_ACTION_SCRIPT_PHP`, the function `proc_open` is used to execute a |
3626 | + PHP script. The attacker-controlled parameter `$poller_id` is retrieved via |
3627 | + the function `get_nfilter_request_var`, which allows arbitrary strings. |
3628 | + This variable is later inserted into the string passed to `proc_open`, |
3629 | + which leads to a command injection vulnerability. By e.g. providing the |
3630 | + `poller_id=;id` the `id` command is executed. In order to reach the |
3631 | + vulnerable call, the attacker must provide a `host_id` and `local_data_id`, |
3632 | + where the `action` of the corresponding `poller_item` is set to |
3633 | + `POLLER_ACTION_SCRIPT_PHP`. Both of these ids (`host_id` and |
3634 | + `local_data_id`) can easily be bruteforced. The only requirement is that a |
3635 | + `poller_item` with an `POLLER_ACTION_SCRIPT_PHP` action exists. This is |
3636 | + very likely on a productive instance because this action is added by some |
3637 | + predefined templates like `Device - Uptime` or `Device - Polling Time`. |
3638 | + This command injection vulnerability allows an unauthenticated user to |
3639 | + execute arbitrary commands if a `poller_item` with the `action` type |
3640 | + `POLLER_ACTION_SCRIPT_PHP` (`2`) is configured. The authorization bypass |
3641 | + should be prevented by not allowing an attacker to make `get_client_addr` |
3642 | + (file `lib/functions.php`) return an arbitrary IP address. This could be |
3643 | + done by not honoring the `HTTP_...` `$_SERVER` variables. If these should |
3644 | + be kept for compatibility reasons it should at least be prevented to fake |
3645 | + the IP address of the server running Cacti. This vulnerability has been |
3646 | + addressed in both the 1.2.x and 1.3.x release branches with `1.2.23` being |
3647 | + the first release containing the patch. |
3648 | +Ubuntu-Description: |
3649 | +Notes: |
3650 | +Mitigation: |
3651 | +Bugs: |
3652 | +Priority: medium |
3653 | +Discovered-by: |
3654 | +Assigned-to: |
3655 | +CVSS: |
3656 | + |
3657 | +Patches_cacti: |
3658 | +upstream_cacti: needs-triage |
3659 | +trusty_cacti: ignored (out of standard support) |
3660 | +xenial_cacti: ignored (out of standard support) |
3661 | +bionic_cacti: needs-triage |
3662 | +focal_cacti: needs-triage |
3663 | +jammy_cacti: needs-triage |
3664 | +kinetic_cacti: needs-triage |
3665 | +trusty/esm_cacti: needs-triage |
3666 | +devel_cacti: needs-triage |
3667 | diff --git a/check-cves.log b/check-cves.log |
3668 | index 32036f4..7d18d5c 100644 |
3669 | --- a/check-cves.log |
3670 | +++ b/check-cves.log |
3671 | @@ -7258,3 +7258,5 @@ |
3672 | 2022-12-01 13:34:56 UTC - 1 added, 0 ignored, 0 skipped, 1 total - files: ['cve-feed.json'] |
3673 | 2022-12-05 02:53:35 UTC - 7 added, 366 ignored, 0 skipped, 373 total - files: ['nvdcve-1.1-2004.json', 'nvdcve-1.1-2005.json', 'nvdcve-1.1-2006.json', 'nvdcve-1.1-2007.json', 'nvdcve-1.1-2008.json', 'nvdcve-1.1-2009.json', 'nvdcve-1.1-2010.json', 'nvdcve-1.1-2011.json', 'nvdcve-1.1-2012.json', 'nvdcve-1.1-2013.json', 'nvdcve-1.1-2014.json', 'nvdcve-1.1-2015.json', 'nvdcve-1.1-2016.json', 'nvdcve-1.1-2017.json', 'nvdcve-1.1-2018.json', 'nvdcve-1.1-2019.json', 'nvdcve-1.1-2020.json', 'nvdcve-1.1-2021.json', 'nvdcve-1.1-2022.json', 'nvdcve-1.1-recent.json'] |
3674 | 2022-12-05 03:24:07 UTC - 22 added, 1 ignored, 0 skipped, 23 total - files: ['debian-import_npzhqw40.json'] |
3675 | +2022-12-06 04:29:18 UTC - 13 added, 87 ignored, 0 skipped, 100 total - files: ['nvdcve-1.1-recent.json'] |
3676 | +2022-12-06 04:42:20 UTC - 5 added, 0 ignored, 0 skipped, 5 total - files: ['debian-import_d8b4xdcy.json'] |
3677 | diff --git a/ignored/not-for-us.txt b/ignored/not-for-us.txt |
3678 | index f9115c7..4b2ad36 100644 |
3679 | --- a/ignored/not-for-us.txt |
3680 | +++ b/ignored/not-for-us.txt |
3681 | @@ -138543,3 +138543,90 @@ CVE-2021-37533 # Apache Commons Net |
3682 | CVE-2022-4273 # SourceCodester Human Resource Management System |
3683 | CVE-2022-4272 # FeMiner wms |
3684 | CVE-2022-45797 # Trend Micro |
3685 | +CVE-2022-4173 # Avast and AVG Antivirus |
3686 | +CVE-2022-44009 # StackStorm |
3687 | +CVE-2022-40918 # firmware lewei_cam binary |
3688 | +CVE-2022-38337 # MobaXterm |
3689 | +CVE-2022-38336 # MobaXterm |
3690 | +CVE-2021-39434 # ZKTeco ZKTime |
3691 | +CVE-2022-46464 # ConcreteCMS |
3692 | +CVE-2022-45990 # Ecommerce-Website |
3693 | +CVE-2022-45769 # ClicShopping_V3 |
3694 | +CVE-2022-45020 # Rukovoditel |
3695 | +CVE-2022-45019 # SLiMS |
3696 | +CVE-2022-43706 # StackStorm |
3697 | +CVE-2022-45912 # Zimbra Collaboration |
3698 | +CVE-2022-43557 # BD BodyGuard infusion pumps |
3699 | +CVE-2022-43556 # Concrete CMS |
3700 | +CVE-2022-43553 # EdgeRouters |
3701 | +CVE-2022-43549 # Veeam Backup for Google Cloud |
3702 | +CVE-2022-40259 # AMI MegaRAC |
3703 | +CVE-2022-40242 # AMI MegaRAC |
3704 | +CVE-2022-35259 # Endpoint Manager |
3705 | +CVE-2022-35258 # Ivanti Connect Secure |
3706 | +CVE-2022-35254 # Ivanti Connect Secure |
3707 | +CVE-2022-2827 # AMI MegaRAC |
3708 | +CVE-2022-27773 # Ivanti EPM |
3709 | +CVE-2022-23143 # ZTE |
3710 | +CVE-2022-46164 # NodeBB |
3711 | +CVE-2022-45481 # Lazy Mouse |
3712 | +CVE-2022-45479 # PC Keyboard |
3713 | +CVE-2022-44039 # Franklin Fueling System FFS Colibri |
3714 | +CVE-2022-37783 # All Craft CMS |
3715 | +CVE-2021-34181 # TomExam |
3716 | +CVE-2022-45771 # Pwndoc |
3717 | +CVE-2022-43097 # Phpgurukul |
3718 | +CVE-2022-3926 # WordPress plugin |
3719 | +CVE-2022-3909 # WordPress plugin |
3720 | +CVE-2022-3907 # WordPress plugin |
3721 | +CVE-2022-3892 # WordPress plugin |
3722 | +CVE-2022-3858 # WordPress plugin |
3723 | +CVE-2022-3856 # WordPress plugin |
3724 | +CVE-2022-3846 # WordPress theme |
3725 | +CVE-2022-3838 # WordPress plugin |
3726 | +CVE-2022-3837 # WordPress plugin |
3727 | +CVE-2022-3830 # WordPress plugin |
3728 | +CVE-2022-3694 # WordPress plugin |
3729 | +CVE-2022-3677 # WordPress plugin |
3730 | +CVE-2022-3426 # WordPress plugin |
3731 | +CVE-2022-3249 # WordPress plugin |
3732 | +CVE-2022-1540 # WordPress plugin |
3733 | +CVE-2022-45478 # Telepad |
3734 | +CVE-2022-45477 # Telepad |
3735 | +CVE-2022-45315 # Mikrotik |
3736 | +CVE-2022-45313 # Mikrotik |
3737 | +CVE-2022-32634 # MediaTek |
3738 | +CVE-2022-32633 # MediaTek |
3739 | +CVE-2022-32632 # MediaTek |
3740 | +CVE-2022-32631 # MediaTek |
3741 | +CVE-2022-32630 # MediaTek |
3742 | +CVE-2022-32629 # MediaTek |
3743 | +CVE-2022-32628 # MediaTek |
3744 | +CVE-2022-32626 # MediaTek |
3745 | +CVE-2022-32625 # MediaTek |
3746 | +CVE-2022-32624 # MediaTek |
3747 | +CVE-2022-32622 # MediaTek |
3748 | +CVE-2022-32621 # MediaTek |
3749 | +CVE-2022-32620 # MediaTek |
3750 | +CVE-2022-32619 # MediaTek |
3751 | +CVE-2022-32598 # MediaTek |
3752 | +CVE-2022-32597 # MediaTek |
3753 | +CVE-2022-32596 # MediaTek |
3754 | +CVE-2022-32594 # MediaTek |
3755 | +CVE-2022-45046 # Apache Camel |
3756 | +CVE-2022-45824 # WordPress plugin |
3757 | +CVE-2022-45822 # WordPress plugin |
3758 | +CVE-2022-4282 # SpringBootCMS |
3759 | +CVE-2022-4281 # Facepay |
3760 | +CVE-2022-43499 # SHIRASAGI |
3761 | +CVE-2022-43487 # Salon booking system |
3762 | +CVE-2022-43484 # TERASOLUNA |
3763 | +CVE-2022-43479 # SHIRASAGI |
3764 | +CVE-2022-43470 # +F software |
3765 | +CVE-2022-43442 # +F software |
3766 | +CVE-2022-42496 # Nako3edit |
3767 | +CVE-2022-41830 # Kyocera Document Solutions |
3768 | +CVE-2022-41807 # Kyocera Document Solutions |
3769 | +CVE-2022-41798 # Kyocera Document Solutions |
3770 | +CVE-2022-41777 # Nako3edit |
3771 | +CVE-2022-41642 # Nako3edit |
3772 | diff --git a/retired/CVE-2022-43516 b/retired/CVE-2022-43516 |
3773 | new file mode 100644 |
3774 | index 0000000..c2f735d |
3775 | --- /dev/null |
3776 | +++ b/retired/CVE-2022-43516 |
3777 | @@ -0,0 +1,29 @@ |
3778 | +Candidate: CVE-2022-43516 |
3779 | +PublicDate: 2022-12-06 |
3780 | +References: |
3781 | + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43516 |
3782 | + https://support.zabbix.com/browse/ZBX-22002 |
3783 | +Description: |
3784 | + A Firewall Rule which allows all incoming TCP connections to all programs |
3785 | + from any source and to all ports is created in Windows Firewall after |
3786 | + Zabbix agent installation (MSI) |
3787 | +Ubuntu-Description: |
3788 | +Notes: |
3789 | + amurray| appears to only affect zabbix on Windows |
3790 | +Mitigation: |
3791 | +Bugs: |
3792 | +Priority: negligible |
3793 | +Discovered-by: |
3794 | +Assigned-to: |
3795 | +CVSS: |
3796 | + |
3797 | +Patches_zabbix: |
3798 | +upstream_zabbix: needs-triage |
3799 | +trusty_zabbix: ignored (out of standard support) |
3800 | +xenial_zabbix: ignored (out of standard support) |
3801 | +bionic_zabbix: not-affected (Windows only) |
3802 | +focal_zabbix: not-affected (Windows only) |
3803 | +jammy_zabbix: not-affected (Windows only) |
3804 | +kinetic_zabbix: not-affected (Windows only) |
3805 | +trusty/esm_zabbix: not-affected (Windows only) |
3806 | +devel_zabbix: not-affected (Windows only) |
3807 | diff --git a/scripts/check-cves-mode.el b/scripts/check-cves-mode.el |
3808 | index 92e334b..1f02b26 100644 |
3809 | --- a/scripts/check-cves-mode.el |
3810 | +++ b/scripts/check-cves-mode.el |
3811 | @@ -121,7 +121,11 @@ A negative argument means move forward that many keywords." |
3812 | |
3813 | (defvar check-cves-mode-source-packages |
3814 | (split-string |
3815 | - (shell-command-to-string "source ~/.ubuntu-cve-tracker.conf; cat $packages_mirror/sources"))) |
3816 | + (shell-command-to-string "umt grep '.*'"))) |
3817 | + |
3818 | +(defvar check-cves-mode-binary-packages |
3819 | + (split-string |
3820 | + (shell-command-to-string "dpkg-query --show --showformat '${Package}\n'"))) |
3821 | |
3822 | (defun check-cves-mode-prompt-for-packages (&optional chosen) |
3823 | "Prompt user for a list of source packages excluding CHOSEN." |
3824 | @@ -253,6 +257,8 @@ A negative argument means move forward that many keywords." |
3825 | |
3826 | (defun check-cves-mode-prompt-with-suggested-names (prompt &optional history names) |
3827 | "Get the suggested NAMES from the ignore line for this CVE via PROMPT with HISTORY." |
3828 | + (if (and names (symbolp names) (not (functionp names))) |
3829 | + (setq names (eval names))) |
3830 | (list (completing-read prompt (or names (check-cves-mode-suggested-names)) |
3831 | nil nil nil history))) |
3832 | |
3833 | @@ -330,11 +336,13 @@ identifier (XXXX-YYYY) via `format'.") |
3834 | `((:name "apt show" |
3835 | :command "apt show %s" |
3836 | :downcase t |
3837 | - :mode compilation-mode) |
3838 | + :mode compilation-mode |
3839 | + :candidates check-cves-mode-binary-packages) |
3840 | (:name "apt showsrc" |
3841 | :command "apt showsrc %s" |
3842 | :downcase t |
3843 | - :mode compilation-mode) |
3844 | + :mode compilation-mode |
3845 | + :candidates check-cves-mode-source-packages) |
3846 | (:name "apt search (host)" |
3847 | :command "apt search %s" |
3848 | :mode compilation-mode) |
3849 | @@ -351,7 +359,8 @@ identifier (XXXX-YYYY) via `format'.") |
3850 | (:name "rmadison" |
3851 | :command "rmadison %s" |
3852 | :downcase t |
3853 | - :mode compilation-mode) |
3854 | + :mode compilation-mode |
3855 | + :candidates check-cves-mode-source-packages) |
3856 | (:name "umt grep" |
3857 | :command "umt grep %s" |
3858 | :downcase t |
3859 | @@ -359,7 +368,8 @@ identifier (XXXX-YYYY) via `format'.") |
3860 | (:name "umt search" |
3861 | :command "umt search %s" |
3862 | :downcase t |
3863 | - :mode compilation-mode) |
3864 | + :mode compilation-mode |
3865 | + :candidates check-cves-mode-source-packages) |
3866 | (:name "command-not-found" |
3867 | :command "/usr/lib/command-not-found %s" |
3868 | :downcase t |
3869 | @@ -410,11 +420,16 @@ identifier (XXXX-YYYY) via `format'.") |
3870 | (defun check-cves-mode-search (tool-name keywords) |
3871 | "Search the current CVEs KEYWORDS with TOOL-NAME (apt / umt etc)." |
3872 | (interactive |
3873 | - (list |
3874 | - (completing-read "Tool: " |
3875 | - (mapcar #'(lambda (e) (plist-get e :name)) |
3876 | - check-cves-mode-search-tools)) |
3877 | - (check-cves-mode-prompt-with-suggested-names "Keywords: "))) |
3878 | + (let* ((name (completing-read "Tool: " |
3879 | + (mapcar #'(lambda (e) (plist-get e :name)) |
3880 | + check-cves-mode-search-tools) |
3881 | + nil t)) |
3882 | + (tool (check-cves-mode-find-search-tool name))) |
3883 | + (list |
3884 | + name |
3885 | + (check-cves-mode-prompt-with-suggested-names "Keywords: " |
3886 | + nil |
3887 | + (plist-get tool :candidates))))) |
3888 | (let ((tool (check-cves-mode-find-search-tool tool-name)) |
3889 | (words (mapconcat #'identity keywords " "))) |
3890 | (unless tool |
3891 | diff --git a/scripts/cve-mode.el b/scripts/cve-mode.el |
3892 | index 4f67f64..cc1b1f8 100644 |
3893 | --- a/scripts/cve-mode.el |
3894 | +++ b/scripts/cve-mode.el |
3895 | @@ -295,7 +295,7 @@ When set to first, following lines will be indented by an extra space." |
3896 | |
3897 | (defvar cve-mode--source-packages |
3898 | (split-string |
3899 | - (shell-command-to-string "source ~/.ubuntu-cve-tracker.conf; cat $packages_mirror/sources"))) |
3900 | + (shell-command-to-string "umt grep '.*'"))) |
3901 | |
3902 | (defvar cve-mode--packages-releases nil) |
3903 | |
3904 | diff --git a/scripts/publish-cves-to-website-api.py b/scripts/publish-cves-to-website-api.py |
3905 | index f5e957b..1adc0bd 100755 |
3906 | --- a/scripts/publish-cves-to-website-api.py |
3907 | +++ b/scripts/publish-cves-to-website-api.py |
3908 | @@ -203,6 +203,13 @@ def main(): |
3909 | default=25, |
3910 | ) |
3911 | parser.add_argument( |
3912 | + "--endpoint", |
3913 | + action="store", |
3914 | + type=str, |
3915 | + default="https://ubuntu.com/security/", |
3916 | + help="API endpoint url. default is https://ubuntu.com/security/", |
3917 | + ) |
3918 | + parser.add_argument( |
3919 | "file_path", |
3920 | action="store", |
3921 | type=str, |
3922 | @@ -211,8 +218,6 @@ def main(): |
3923 | ) |
3924 | args = parser.parse_args() |
3925 | |
3926 | - url = "https://ubuntu.com/security/" |
3927 | - |
3928 | ## if args: |
3929 | ## headers = {"Content-type": "application/json"} |
3930 | cves = [] |
3931 | @@ -283,7 +288,7 @@ def main(): |
3932 | for chunk in [ |
3933 | cves[i : i + chunksize] for i in range(0, len(cves), chunksize) # noqa: E203 |
3934 | ]: |
3935 | - push_chunks(args, url, chunk) |
3936 | + push_chunks(args, args.endpoint, chunk) |
3937 | |
3938 | for cve_id in cache_not_for_us_cve_ids: |
3939 | add_cve_to_ignore_cache(cve_id) |
LGTM!