Merge ~pfsmorigo/ubuntu-cve-tracker:pfsmorigo/add_endpont_argument into ubuntu-cve-tracker:master

Proposed by Paulo Flabiano Smorigo
Status: Merged
Merge reported by: Paulo Flabiano Smorigo
Merged at revision: d17cea6985a4ab0fd954d17d738df44bfa62fdce
Proposed branch: ~pfsmorigo/ubuntu-cve-tracker:pfsmorigo/add_endpont_argument
Merge into: ubuntu-cve-tracker:master
Diff against target: 3939 lines (+3623/-25)
28 files modified
active/CVE-2021-3449 (+1/-1)
active/CVE-2022-20565 (+757/-0)
active/CVE-2022-20566 (+757/-0)
active/CVE-2022-20567 (+757/-0)
active/CVE-2022-20568 (+759/-0)
active/CVE-2022-23467 (+33/-0)
active/CVE-2022-37325 (+28/-0)
active/CVE-2022-38533 (+7/-5)
active/CVE-2022-40303 (+3/-2)
active/CVE-2022-40304 (+3/-2)
active/CVE-2022-4170 (+27/-0)
active/CVE-2022-42705 (+29/-0)
active/CVE-2022-42706 (+29/-0)
active/CVE-2022-42919 (+1/-1)
active/CVE-2022-4292 (+29/-0)
active/CVE-2022-4293 (+30/-0)
active/CVE-2022-43497 (+28/-0)
active/CVE-2022-43500 (+28/-0)
active/CVE-2022-43504 (+29/-0)
active/CVE-2022-43515 (+31/-0)
active/CVE-2022-45283 (+27/-0)
active/CVE-2022-46169 (+78/-0)
check-cves.log (+2/-0)
ignored/not-for-us.txt (+87/-0)
retired/CVE-2022-43516 (+29/-0)
scripts/check-cves-mode.el (+25/-10)
scripts/cve-mode.el (+1/-1)
scripts/publish-cves-to-website-api.py (+8/-3)
Reviewer Review Type Date Requested Status
Steve Beattie Approve
Alex Murray Approve
Review via email: mp+434171@code.launchpad.net
To post a comment you must log in.
Revision history for this message
Alex Murray (alexmurray) wrote :

LGTM!

review: Approve
Revision history for this message
Steve Beattie (sbeattie) wrote :

Agreed, LGTM, please merge.

It might make sense in a followup commit to convert to using argparse's formatter_class=argparse.ArgumentDefaultsHelpFormatter instead of repeating the URL in the help message (it would also give notice that the default action for this script is to add a USN). Given that the script is usually inoked by wrapper scripts and not commonly invoked directly, it's not a particularly important thing.

Thanks!

review: Approve

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1diff --git a/active/CVE-2021-3449 b/active/CVE-2021-3449
2index 76361e6..4b45060 100644
3--- a/active/CVE-2021-3449
4+++ b/active/CVE-2021-3449
5@@ -143,7 +143,7 @@ upstream_postgresql-9.5: needs-triage
6 trusty_postgresql-9.5: DNE
7 trusty/esm_postgresql-9.5: DNE
8 xenial_postgresql-9.5: ignored (end of standard support, was needs-triage)
9-esm-infra/xenial_postgresql-9.5: needs-triage
10+esm-infra/xenial_postgresql-9.5: not-affected (code not present)
11 bionic_postgresql-9.5: DNE
12 focal_postgresql-9.5: DNE
13 hirsute_postgresql-9.5: DNE
14diff --git a/active/CVE-2022-20565 b/active/CVE-2022-20565
15new file mode 100644
16index 0000000..c8207ef
17--- /dev/null
18+++ b/active/CVE-2022-20565
19@@ -0,0 +1,757 @@
20+Candidate: CVE-2022-20565
21+PublicDate: 2022-12-06
22+References:
23+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20565
24+ https://git.kernel.org/linus/bce1305c0ece3dc549663605e567655dd701752c
25+Description:
26+ [Unknown description]
27+Ubuntu-Description:
28+Notes:
29+Mitigation:
30+Bugs:
31+Priority: medium
32+Discovered-by:
33+Assigned-to:
34+CVSS:
35+
36+Patches_linux:
37+ break-fix: - bce1305c0ece3dc549663605e567655dd701752c
38+upstream_linux: released (5.8.7-1)
39+esm-infra/xenial_linux: needs-triage
40+trusty_linux: ignored (out of standard support)
41+xenial_linux: ignored (out of standard support)
42+bionic_linux: needs-triage
43+focal_linux: needs-triage
44+jammy_linux: not-affected (5.15.0-56.62)
45+kinetic_linux: not-affected
46+trusty/esm_linux: not-affected
47+devel_linux: not-affected
48+
49+Patches_linux-hwe:
50+upstream_linux-hwe: needs-triage
51+esm-infra/xenial_linux-hwe: needs-triage
52+trusty_linux-hwe: DNE
53+xenial_linux-hwe: ignored (end of standard support)
54+bionic_linux-hwe: ignored (replaced by linux-hwe-5.4)
55+focal_linux-hwe: DNE
56+jammy_linux-hwe: DNE
57+kinetic_linux-hwe: DNE
58+
59+Patches_linux-hwe-5.4:
60+upstream_linux-hwe-5.4: needs-triage
61+trusty_linux-hwe-5.4: DNE
62+xenial_linux-hwe-5.4: DNE
63+bionic_linux-hwe-5.4: needs-triage
64+focal_linux-hwe-5.4: DNE
65+jammy_linux-hwe-5.4: DNE
66+kinetic_linux-hwe-5.4: DNE
67+
68+Patches_linux-hwe-5.8:
69+upstream_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11)
70+trusty_linux-hwe-5.8: DNE
71+xenial_linux-hwe-5.8: DNE
72+bionic_linux-hwe-5.8: DNE
73+focal_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11)
74+jammy_linux-hwe-5.8: DNE
75+kinetic_linux-hwe-5.8: DNE
76+
77+Patches_linux-hwe-5.11:
78+upstream_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13)
79+trusty_linux-hwe-5.11: DNE
80+xenial_linux-hwe-5.11: DNE
81+bionic_linux-hwe-5.11: DNE
82+focal_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13)
83+jammy_linux-hwe-5.11: DNE
84+kinetic_linux-hwe-5.11: DNE
85+
86+Patches_linux-hwe-5.13:
87+upstream_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15)
88+trusty_linux-hwe-5.13: DNE
89+xenial_linux-hwe-5.13: DNE
90+bionic_linux-hwe-5.13: DNE
91+focal_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15)
92+jammy_linux-hwe-5.13: DNE
93+kinetic_linux-hwe-5.13: DNE
94+
95+Patches_linux-hwe-5.15:
96+upstream_linux-hwe-5.15: needs-triage
97+trusty_linux-hwe-5.15: DNE
98+xenial_linux-hwe-5.15: DNE
99+bionic_linux-hwe-5.15: DNE
100+focal_linux-hwe-5.15: needs-triage
101+jammy_linux-hwe-5.15: DNE
102+kinetic_linux-hwe-5.15: DNE
103+
104+Patches_linux-hwe-edge:
105+upstream_linux-hwe-edge: needs-triage
106+esm-infra/xenial_linux-hwe-edge: ignored (superseded by linux-hwe)
107+trusty_linux-hwe-edge: DNE
108+xenial_linux-hwe-edge: ignored (superseded by linux-hwe)
109+bionic_linux-hwe-edge: ignored (superseded by linux-hwe-5.4)
110+focal_linux-hwe-edge: DNE
111+jammy_linux-hwe-edge: DNE
112+kinetic_linux-hwe-edge: DNE
113+
114+Patches_linux-lts-xenial:
115+upstream_linux-lts-xenial: needs-triage
116+trusty_linux-lts-xenial: ignored (out of standard support)
117+xenial_linux-lts-xenial: DNE
118+bionic_linux-lts-xenial: DNE
119+focal_linux-lts-xenial: DNE
120+jammy_linux-lts-xenial: DNE
121+kinetic_linux-lts-xenial: DNE
122+trusty/esm_linux-lts-xenial: needs-triage
123+
124+Patches_linux-kvm:
125+upstream_linux-kvm: needs-triage
126+esm-infra/xenial_linux-kvm: needs-triage
127+trusty_linux-kvm: DNE
128+xenial_linux-kvm: ignored (end of standard support)
129+bionic_linux-kvm: needs-triage
130+focal_linux-kvm: needs-triage
131+jammy_linux-kvm: needs-triage
132+kinetic_linux-kvm: needs-triage
133+devel_linux-kvm: needs-triage
134+
135+Patches_linux-aws:
136+upstream_linux-aws: needs-triage
137+esm-infra/xenial_linux-aws: needs-triage
138+trusty_linux-aws: ignored (out of standard support)
139+xenial_linux-aws: ignored (end of standard support)
140+bionic_linux-aws: needs-triage
141+focal_linux-aws: needs-triage
142+jammy_linux-aws: needs-triage
143+kinetic_linux-aws: needs-triage
144+trusty/esm_linux-aws: needs-triage
145+devel_linux-aws: needs-triage
146+
147+Patches_linux-aws-5.0:
148+upstream_linux-aws-5.0: needs-triage
149+trusty_linux-aws-5.0: DNE
150+xenial_linux-aws-5.0: DNE
151+bionic_linux-aws-5.0: ignored (superseded by linux-aws-5.3)
152+focal_linux-aws-5.0: DNE
153+jammy_linux-aws-5.0: DNE
154+kinetic_linux-aws-5.0: DNE
155+
156+Patches_linux-aws-5.3:
157+upstream_linux-aws-5.3: ignored (superseded by linux-aws-5.4)
158+trusty_linux-aws-5.3: DNE
159+xenial_linux-aws-5.3: DNE
160+bionic_linux-aws-5.3: ignored (superseded by linux-aws-5.4)
161+focal_linux-aws-5.3: DNE
162+jammy_linux-aws-5.3: DNE
163+kinetic_linux-aws-5.3: DNE
164+
165+Patches_linux-aws-5.4:
166+upstream_linux-aws-5.4: needs-triage
167+trusty_linux-aws-5.4: DNE
168+xenial_linux-aws-5.4: DNE
169+bionic_linux-aws-5.4: needs-triage
170+focal_linux-aws-5.4: DNE
171+jammy_linux-aws-5.4: DNE
172+kinetic_linux-aws-5.4: DNE
173+
174+Patches_linux-aws-5.8:
175+upstream_linux-aws-5.8: ignored (superseded by linux-aws-5.11)
176+trusty_linux-aws-5.8: DNE
177+xenial_linux-aws-5.8: DNE
178+bionic_linux-aws-5.8: DNE
179+focal_linux-aws-5.8: ignored (superseded by linux-aws-5.11)
180+jammy_linux-aws-5.8: DNE
181+kinetic_linux-aws-5.8: DNE
182+
183+Patches_linux-aws-5.11:
184+upstream_linux-aws-5.11: ignored (superseded by linux-aws-5.13)
185+trusty_linux-aws-5.11: DNE
186+xenial_linux-aws-5.11: DNE
187+bionic_linux-aws-5.11: DNE
188+focal_linux-aws-5.11: ignored (superseded by linux-aws-5.13)
189+jammy_linux-aws-5.11: DNE
190+kinetic_linux-aws-5.11: DNE
191+
192+Patches_linux-aws-5.13:
193+upstream_linux-aws-5.13: ignored (superseded by linux-aws-5.15)
194+trusty_linux-aws-5.13: DNE
195+xenial_linux-aws-5.13: DNE
196+bionic_linux-aws-5.13: DNE
197+focal_linux-aws-5.13: ignored (superseded by linux-aws-5.15)
198+jammy_linux-aws-5.13: DNE
199+kinetic_linux-aws-5.13: DNE
200+
201+Patches_linux-aws-5.15:
202+upstream_linux-aws-5.15: needs-triage
203+trusty_linux-aws-5.15: DNE
204+xenial_linux-aws-5.15: DNE
205+bionic_linux-aws-5.15: DNE
206+focal_linux-aws-5.15: needs-triage
207+jammy_linux-aws-5.15: DNE
208+kinetic_linux-aws-5.15: DNE
209+
210+Patches_linux-aws-hwe:
211+upstream_linux-aws-hwe: needs-triage
212+esm-infra/xenial_linux-aws-hwe: needs-triage
213+trusty_linux-aws-hwe: DNE
214+xenial_linux-aws-hwe: ignored (end of standard support)
215+bionic_linux-aws-hwe: DNE
216+focal_linux-aws-hwe: DNE
217+jammy_linux-aws-hwe: DNE
218+kinetic_linux-aws-hwe: DNE
219+
220+Patches_linux-azure:
221+upstream_linux-azure: needs-triage
222+esm-infra/xenial_linux-azure: needs-triage
223+trusty_linux-azure: ignored (out of standard support)
224+xenial_linux-azure: ignored (end of standard support)
225+bionic_linux-azure: ignored (superseded by linux-azure-5.3)
226+focal_linux-azure: needs-triage
227+jammy_linux-azure: needs-triage
228+kinetic_linux-azure: needs-triage
229+trusty/esm_linux-azure: needs-triage
230+devel_linux-azure: needs-triage
231+
232+Patches_linux-azure-4.15:
233+upstream_linux-azure-4.15: needs-triage
234+trusty_linux-azure-4.15: DNE
235+xenial_linux-azure-4.15: DNE
236+bionic_linux-azure-4.15: needs-triage
237+focal_linux-azure-4.15: DNE
238+jammy_linux-azure-4.15: DNE
239+kinetic_linux-azure-4.15: DNE
240+
241+Patches_linux-azure-5.3:
242+upstream_linux-azure-5.3: ignored (superseded by linux-azure-5.4)
243+trusty_linux-azure-5.3: DNE
244+xenial_linux-azure-5.3: DNE
245+bionic_linux-azure-5.3: ignored (superseded by linux-azure-5.4)
246+focal_linux-azure-5.3: DNE
247+jammy_linux-azure-5.3: DNE
248+kinetic_linux-azure-5.3: DNE
249+
250+Patches_linux-azure-5.4:
251+upstream_linux-azure-5.4: needs-triage
252+trusty_linux-azure-5.4: DNE
253+xenial_linux-azure-5.4: DNE
254+bionic_linux-azure-5.4: needs-triage
255+focal_linux-azure-5.4: DNE
256+jammy_linux-azure-5.4: DNE
257+kinetic_linux-azure-5.4: DNE
258+
259+Patches_linux-azure-5.8:
260+upstream_linux-azure-5.8: ignored (superseded by linux-azure-5.11)
261+trusty_linux-azure-5.8: DNE
262+xenial_linux-azure-5.8: DNE
263+bionic_linux-azure-5.8: DNE
264+focal_linux-azure-5.8: ignored (superseded by linux-azure-5.11)
265+jammy_linux-azure-5.8: DNE
266+kinetic_linux-azure-5.8: DNE
267+
268+Patches_linux-azure-5.11:
269+upstream_linux-azure-5.11: ignored (superseded by linux-azure-5.13)
270+trusty_linux-azure-5.11: DNE
271+xenial_linux-azure-5.11: DNE
272+bionic_linux-azure-5.11: DNE
273+focal_linux-azure-5.11: ignored (superseded by linux-azure-5.13)
274+jammy_linux-azure-5.11: DNE
275+kinetic_linux-azure-5.11: DNE
276+
277+Patches_linux-azure-5.13:
278+upstream_linux-azure-5.13: ignored (superseded by linux-azure-5.15)
279+trusty_linux-azure-5.13: DNE
280+xenial_linux-azure-5.13: DNE
281+bionic_linux-azure-5.13: DNE
282+focal_linux-azure-5.13: ignored (superseded by linux-azure-5.15)
283+jammy_linux-azure-5.13: DNE
284+kinetic_linux-azure-5.13: DNE
285+
286+Patches_linux-azure-5.15:
287+upstream_linux-azure-5.15: needs-triage
288+trusty_linux-azure-5.15: DNE
289+xenial_linux-azure-5.15: DNE
290+bionic_linux-azure-5.15: DNE
291+focal_linux-azure-5.15: needs-triage
292+jammy_linux-azure-5.15: DNE
293+kinetic_linux-azure-5.15: DNE
294+
295+Patches_linux-azure-fde:
296+upstream_linux-azure-fde: needs-triage
297+trusty_linux-azure-fde: DNE
298+xenial_linux-azure-fde: DNE
299+bionic_linux-azure-fde: DNE
300+focal_linux-azure-fde: needs-triage
301+jammy_linux-azure-fde: needs-triage
302+kinetic_linux-azure-fde: DNE
303+
304+Patches_linux-azure-fde-5.15:
305+upstream_linux-azure-fde-5.15: needs-triage
306+trusty_linux-azure-fde-5.15: DNE
307+xenial_linux-azure-fde-5.15: DNE
308+bionic_linux-azure-fde-5.15: DNE
309+focal_linux-azure-fde-5.15: needs-triage
310+jammy_linux-azure-fde-5.15: DNE
311+kinetic_linux-azure-fde-5.15: DNE
312+
313+Patches_linux-bluefield:
314+upstream_linux-bluefield: needs-triage
315+trusty_linux-bluefield: DNE
316+xenial_linux-bluefield: DNE
317+bionic_linux-bluefield: DNE
318+focal_linux-bluefield: needs-triage
319+jammy_linux-bluefield: DNE
320+kinetic_linux-bluefield: DNE
321+
322+Patches_linux-dell300x:
323+upstream_linux-dell300x: needs-triage
324+trusty_linux-dell300x: DNE
325+xenial_linux-dell300x: DNE
326+bionic_linux-dell300x: needs-triage
327+focal_linux-dell300x: DNE
328+jammy_linux-dell300x: DNE
329+kinetic_linux-dell300x: DNE
330+
331+Patches_linux-azure-edge:
332+upstream_linux-azure-edge: needs-triage
333+trusty_linux-azure-edge: DNE
334+xenial_linux-azure-edge: DNE
335+bionic_linux-azure-edge: ignored (superseded by linux-azure-5.3)
336+focal_linux-azure-edge: DNE
337+jammy_linux-azure-edge: DNE
338+kinetic_linux-azure-edge: DNE
339+
340+Patches_linux-fips:
341+upstream_linux-fips: needs-triage
342+trusty_linux-fips: ignored (out of standard support)
343+xenial_linux-fips: ignored (out of standard support)
344+bionic_linux-fips: DNE
345+focal_linux-fips: DNE
346+jammy_linux-fips: DNE
347+kinetic_linux-fips: DNE
348+fips/xenial_linux-fips: needs-triage
349+fips/bionic_linux-fips: needs-triage
350+fips/focal_linux-fips: needs-triage
351+fips-updates/xenial_linux-fips: needs-triage
352+fips-updates/bionic_linux-fips: needs-triage
353+fips-updates/focal_linux-fips: needs-triage
354+
355+Patches_linux-gcp:
356+upstream_linux-gcp: needs-triage
357+esm-infra/xenial_linux-gcp: needs-triage
358+trusty_linux-gcp: DNE
359+xenial_linux-gcp: ignored (end of standard support)
360+bionic_linux-gcp: ignored (superseded by linux-gcp-5.3)
361+focal_linux-gcp: needs-triage
362+jammy_linux-gcp: needs-triage
363+kinetic_linux-gcp: needs-triage
364+devel_linux-gcp: needs-triage
365+
366+Patches_linux-gcp-4.15:
367+upstream_linux-gcp-4.15: needs-triage
368+trusty_linux-gcp-4.15: DNE
369+xenial_linux-gcp-4.15: DNE
370+bionic_linux-gcp-4.15: needs-triage
371+focal_linux-gcp-4.15: DNE
372+jammy_linux-gcp-4.15: DNE
373+kinetic_linux-gcp-4.15: DNE
374+
375+Patches_linux-gcp-5.3:
376+upstream_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4)
377+trusty_linux-gcp-5.3: DNE
378+xenial_linux-gcp-5.3: DNE
379+bionic_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4)
380+focal_linux-gcp-5.3: DNE
381+jammy_linux-gcp-5.3: DNE
382+kinetic_linux-gcp-5.3: DNE
383+
384+Patches_linux-gcp-5.4:
385+upstream_linux-gcp-5.4: needs-triage
386+trusty_linux-gcp-5.4: DNE
387+xenial_linux-gcp-5.4: DNE
388+bionic_linux-gcp-5.4: needs-triage
389+focal_linux-gcp-5.4: DNE
390+jammy_linux-gcp-5.4: DNE
391+kinetic_linux-gcp-5.4: DNE
392+
393+Patches_linux-gcp-5.8:
394+upstream_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11)
395+trusty_linux-gcp-5.8: DNE
396+xenial_linux-gcp-5.8: DNE
397+bionic_linux-gcp-5.8: DNE
398+focal_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11)
399+jammy_linux-gcp-5.8: DNE
400+kinetic_linux-gcp-5.8: DNE
401+
402+Patches_linux-gcp-5.11:
403+upstream_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13)
404+trusty_linux-gcp-5.11: DNE
405+xenial_linux-gcp-5.11: DNE
406+bionic_linux-gcp-5.11: DNE
407+focal_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13)
408+jammy_linux-gcp-5.11: DNE
409+kinetic_linux-gcp-5.11: DNE
410+
411+Patches_linux-gcp-5.13:
412+upstream_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15)
413+trusty_linux-gcp-5.13: DNE
414+xenial_linux-gcp-5.13: DNE
415+bionic_linux-gcp-5.13: DNE
416+focal_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15)
417+jammy_linux-gcp-5.13: DNE
418+kinetic_linux-gcp-5.13: DNE
419+
420+Patches_linux-gcp-5.15:
421+upstream_linux-gcp-5.15: needs-triage
422+trusty_linux-gcp-5.15: DNE
423+xenial_linux-gcp-5.15: DNE
424+bionic_linux-gcp-5.15: DNE
425+focal_linux-gcp-5.15: needs-triage
426+jammy_linux-gcp-5.15: DNE
427+kinetic_linux-gcp-5.15: DNE
428+
429+Patches_linux-gke:
430+upstream_linux-gke: needs-triage
431+trusty_linux-gke: DNE
432+xenial_linux-gke: ignored (reached end of standard support)
433+bionic_linux-gke: DNE
434+focal_linux-gke: needs-triage
435+jammy_linux-gke: needs-triage
436+kinetic_linux-gke: DNE
437+
438+Patches_linux-gke-4.15:
439+upstream_linux-gke-4.15: needs-triage
440+trusty_linux-gke-4.15: DNE
441+xenial_linux-gke-4.15: DNE
442+bionic_linux-gke-4.15: needs-triage
443+focal_linux-gke-4.15: DNE
444+jammy_linux-gke-4.15: DNE
445+kinetic_linux-gke-4.15: DNE
446+
447+Patches_linux-gke-5.0:
448+upstream_linux-gke-5.0: needs-triage
449+trusty_linux-gke-5.0: DNE
450+xenial_linux-gke-5.0: DNE
451+bionic_linux-gke-5.0: ignored (superseded by linux-gke-5.3)
452+focal_linux-gke-5.0: DNE
453+jammy_linux-gke-5.0: DNE
454+kinetic_linux-gke-5.0: DNE
455+
456+Patches_linux-gke-5.3:
457+upstream_linux-gke-5.3: ignored (superseded by linux-gke-5.4)
458+trusty_linux-gke-5.3: DNE
459+xenial_linux-gke-5.3: DNE
460+bionic_linux-gke-5.3: ignored (superseded by linux-gke-5.4)
461+focal_linux-gke-5.3: DNE
462+jammy_linux-gke-5.3: DNE
463+kinetic_linux-gke-5.3: DNE
464+
465+Patches_linux-gke-5.4:
466+upstream_linux-gke-5.4: needs-triage
467+trusty_linux-gke-5.4: DNE
468+xenial_linux-gke-5.4: DNE
469+bionic_linux-gke-5.4: needs-triage
470+focal_linux-gke-5.4: DNE
471+jammy_linux-gke-5.4: DNE
472+kinetic_linux-gke-5.4: DNE
473+
474+Patches_linux-gke-5.15:
475+upstream_linux-gke-5.15: needs-triage
476+trusty_linux-gke-5.15: DNE
477+xenial_linux-gke-5.15: DNE
478+bionic_linux-gke-5.15: DNE
479+focal_linux-gke-5.15: needs-triage
480+jammy_linux-gke-5.15: DNE
481+kinetic_linux-gke-5.15: DNE
482+
483+Patches_linux-gkeop:
484+upstream_linux-gkeop: needs-triage
485+trusty_linux-gkeop: DNE
486+xenial_linux-gkeop: DNE
487+bionic_linux-gkeop: DNE
488+focal_linux-gkeop: needs-triage
489+jammy_linux-gkeop: needs-triage
490+kinetic_linux-gkeop: DNE
491+
492+Patches_linux-gkeop-5.4:
493+upstream_linux-gkeop-5.4: needs-triage
494+trusty_linux-gkeop-5.4: DNE
495+xenial_linux-gkeop-5.4: DNE
496+bionic_linux-gkeop-5.4: needs-triage
497+focal_linux-gkeop-5.4: DNE
498+jammy_linux-gkeop-5.4: DNE
499+kinetic_linux-gkeop-5.4: DNE
500+
501+Patches_linux-ibm:
502+upstream_linux-ibm: needs-triage
503+trusty_linux-ibm: DNE
504+xenial_linux-ibm: DNE
505+bionic_linux-ibm: DNE
506+focal_linux-ibm: needs-triage
507+jammy_linux-ibm: needs-triage
508+kinetic_linux-ibm: needs-triage
509+devel_linux-ibm: needs-triage
510+
511+Patches_linux-ibm-5.4:
512+upstream_linux-ibm-5.4: needs-triage
513+trusty_linux-ibm-5.4: DNE
514+xenial_linux-ibm-5.4: DNE
515+bionic_linux-ibm-5.4: needs-triage
516+focal_linux-ibm-5.4: DNE
517+jammy_linux-ibm-5.4: DNE
518+kinetic_linux-ibm-5.4: DNE
519+
520+Patches_linux-intel-5.13:
521+upstream_linux-intel-5.13: needs-triage
522+trusty_linux-intel-5.13: DNE
523+xenial_linux-intel-5.13: DNE
524+bionic_linux-intel-5.13: DNE
525+focal_linux-intel-5.13: needs-triage
526+jammy_linux-intel-5.13: DNE
527+kinetic_linux-intel-5.13: DNE
528+
529+Patches_linux-intel-iotg:
530+upstream_linux-intel-iotg: needs-triage
531+trusty_linux-intel-iotg: DNE
532+xenial_linux-intel-iotg: DNE
533+bionic_linux-intel-iotg: DNE
534+focal_linux-intel-iotg: DNE
535+jammy_linux-intel-iotg: needs-triage
536+kinetic_linux-intel-iotg: DNE
537+
538+Patches_linux-intel-iotg-5.15:
539+upstream_linux-intel-iotg-5.15: needs-triage
540+trusty_linux-intel-iotg-5.15: DNE
541+xenial_linux-intel-iotg-5.15: DNE
542+bionic_linux-intel-iotg-5.15: DNE
543+focal_linux-intel-iotg-5.15: needs-triage
544+jammy_linux-intel-iotg-5.15: DNE
545+kinetic_linux-intel-iotg-5.15: DNE
546+
547+Patches_linux-lowlatency:
548+upstream_linux-lowlatency: needs-triage
549+trusty_linux-lowlatency: DNE
550+xenial_linux-lowlatency: DNE
551+bionic_linux-lowlatency: DNE
552+focal_linux-lowlatency: DNE
553+jammy_linux-lowlatency: needs-triage
554+kinetic_linux-lowlatency: needs-triage
555+devel_linux-lowlatency: needs-triage
556+
557+Patches_linux-lowlatency-hwe-5.15:
558+upstream_linux-lowlatency-hwe-5.15: needs-triage
559+trusty_linux-lowlatency-hwe-5.15: DNE
560+xenial_linux-lowlatency-hwe-5.15: DNE
561+bionic_linux-lowlatency-hwe-5.15: DNE
562+focal_linux-lowlatency-hwe-5.15: needs-triage
563+jammy_linux-lowlatency-hwe-5.15: DNE
564+kinetic_linux-lowlatency-hwe-5.15: DNE
565+
566+Patches_linux-oracle:
567+upstream_linux-oracle: needs-triage
568+esm-infra/xenial_linux-oracle: needs-triage
569+trusty_linux-oracle: DNE
570+xenial_linux-oracle: ignored (end of standard support)
571+bionic_linux-oracle: needs-triage
572+focal_linux-oracle: needs-triage
573+jammy_linux-oracle: needs-triage
574+kinetic_linux-oracle: needs-triage
575+devel_linux-oracle: needs-triage
576+
577+Patches_linux-oracle-5.0:
578+upstream_linux-oracle-5.0: needs-triage
579+trusty_linux-oracle-5.0: DNE
580+xenial_linux-oracle-5.0: DNE
581+bionic_linux-oracle-5.0: ignored (superseded by linux-oracle-5.3)
582+focal_linux-oracle-5.0: DNE
583+jammy_linux-oracle-5.0: DNE
584+kinetic_linux-oracle-5.0: DNE
585+
586+Patches_linux-oracle-5.3:
587+upstream_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4)
588+trusty_linux-oracle-5.3: DNE
589+xenial_linux-oracle-5.3: DNE
590+bionic_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4)
591+focal_linux-oracle-5.3: DNE
592+jammy_linux-oracle-5.3: DNE
593+kinetic_linux-oracle-5.3: DNE
594+
595+Patches_linux-oracle-5.4:
596+upstream_linux-oracle-5.4: needs-triage
597+trusty_linux-oracle-5.4: DNE
598+xenial_linux-oracle-5.4: DNE
599+bionic_linux-oracle-5.4: needs-triage
600+focal_linux-oracle-5.4: DNE
601+jammy_linux-oracle-5.4: DNE
602+kinetic_linux-oracle-5.4: DNE
603+
604+Patches_linux-oracle-5.8:
605+upstream_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11)
606+trusty_linux-oracle-5.8: DNE
607+xenial_linux-oracle-5.8: DNE
608+bionic_linux-oracle-5.8: DNE
609+focal_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11)
610+jammy_linux-oracle-5.8: DNE
611+kinetic_linux-oracle-5.8: DNE
612+
613+Patches_linux-oracle-5.11:
614+upstream_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13)
615+trusty_linux-oracle-5.11: DNE
616+xenial_linux-oracle-5.11: DNE
617+bionic_linux-oracle-5.11: DNE
618+focal_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13)
619+jammy_linux-oracle-5.11: DNE
620+kinetic_linux-oracle-5.11: DNE
621+
622+Patches_linux-oracle-5.13:
623+upstream_linux-oracle-5.13: needs-triage
624+trusty_linux-oracle-5.13: DNE
625+xenial_linux-oracle-5.13: DNE
626+bionic_linux-oracle-5.13: DNE
627+focal_linux-oracle-5.13: needs-triage
628+jammy_linux-oracle-5.13: DNE
629+kinetic_linux-oracle-5.13: DNE
630+
631+Patches_linux-oracle-5.15:
632+upstream_linux-oracle-5.15: needs-triage
633+trusty_linux-oracle-5.15: DNE
634+xenial_linux-oracle-5.15: DNE
635+bionic_linux-oracle-5.15: DNE
636+focal_linux-oracle-5.15: needs-triage
637+jammy_linux-oracle-5.15: DNE
638+kinetic_linux-oracle-5.15: DNE
639+
640+Patches_linux-oem:
641+upstream_linux-oem: needs-triage
642+trusty_linux-oem: DNE
643+xenial_linux-oem: ignored (superseded by linux-hwe)
644+bionic_linux-oem: needs-triage
645+focal_linux-oem: DNE
646+jammy_linux-oem: DNE
647+kinetic_linux-oem: DNE
648+
649+Patches_linux-oem-5.6:
650+upstream_linux-oem-5.6: needs-triage
651+trusty_linux-oem-5.6: DNE
652+xenial_linux-oem-5.6: DNE
653+bionic_linux-oem-5.6: DNE
654+focal_linux-oem-5.6: needs-triage
655+jammy_linux-oem-5.6: DNE
656+kinetic_linux-oem-5.6: DNE
657+
658+Patches_linux-oem-5.10:
659+upstream_linux-oem-5.10: needs-triage
660+trusty_linux-oem-5.10: DNE
661+xenial_linux-oem-5.10: DNE
662+bionic_linux-oem-5.10: DNE
663+focal_linux-oem-5.10: needs-triage
664+jammy_linux-oem-5.10: DNE
665+kinetic_linux-oem-5.10: DNE
666+
667+Patches_linux-oem-5.13:
668+upstream_linux-oem-5.13: ignored (superseded by linux-oem-5.14)
669+trusty_linux-oem-5.13: DNE
670+xenial_linux-oem-5.13: DNE
671+bionic_linux-oem-5.13: DNE
672+focal_linux-oem-5.13: ignored (superseded by linux-oem-5.14)
673+jammy_linux-oem-5.13: DNE
674+kinetic_linux-oem-5.13: DNE
675+
676+Patches_linux-oem-5.14:
677+upstream_linux-oem-5.14: needs-triage
678+trusty_linux-oem-5.14: DNE
679+xenial_linux-oem-5.14: DNE
680+bionic_linux-oem-5.14: DNE
681+focal_linux-oem-5.14: needs-triage
682+jammy_linux-oem-5.14: DNE
683+kinetic_linux-oem-5.14: DNE
684+
685+Patches_linux-oem-5.17:
686+upstream_linux-oem-5.17: needs-triage
687+trusty_linux-oem-5.17: DNE
688+xenial_linux-oem-5.17: DNE
689+bionic_linux-oem-5.17: DNE
690+focal_linux-oem-5.17: DNE
691+jammy_linux-oem-5.17: needs-triage
692+kinetic_linux-oem-5.17: needs-triage
693+devel_linux-oem-5.17: needs-triage
694+
695+Patches_linux-oem-osp1:
696+upstream_linux-oem-osp1: needs-triage
697+trusty_linux-oem-osp1: DNE
698+xenial_linux-oem-osp1: DNE
699+bionic_linux-oem-osp1: needs-triage
700+focal_linux-oem-osp1: DNE
701+jammy_linux-oem-osp1: DNE
702+kinetic_linux-oem-osp1: DNE
703+
704+Patches_linux-raspi:
705+upstream_linux-raspi: needs-triage
706+trusty_linux-raspi: DNE
707+xenial_linux-raspi: DNE
708+bionic_linux-raspi: DNE
709+focal_linux-raspi: needs-triage
710+jammy_linux-raspi: needs-triage
711+kinetic_linux-raspi: needs-triage
712+devel_linux-raspi: needs-triage
713+
714+Patches_linux-raspi2:
715+upstream_linux-raspi2: needs-triage
716+trusty_linux-raspi2: DNE
717+xenial_linux-raspi2: ignored (end of standard support)
718+bionic_linux-raspi2: needs-triage
719+focal_linux-raspi2: ignored (replaced by linux-raspi)
720+jammy_linux-raspi2: DNE
721+kinetic_linux-raspi2: DNE
722+
723+Patches_linux-raspi2-5.3:
724+upstream_linux-raspi2-5.3: ignored (superseded by linux-raspi2-5.4)
725+trusty_linux-raspi2-5.3: DNE
726+xenial_linux-raspi2-5.3: DNE
727+bionic_linux-raspi2-5.3: ignored (superseded by linux-raspi-5.4)
728+focal_linux-raspi2-5.3: DNE
729+jammy_linux-raspi2-5.3: DNE
730+kinetic_linux-raspi2-5.3: DNE
731+
732+Patches_linux-raspi-5.4:
733+upstream_linux-raspi-5.4: needs-triage
734+trusty_linux-raspi-5.4: DNE
735+xenial_linux-raspi-5.4: DNE
736+bionic_linux-raspi-5.4: needs-triage
737+focal_linux-raspi-5.4: DNE
738+jammy_linux-raspi-5.4: DNE
739+kinetic_linux-raspi-5.4: DNE
740+
741+Patches_linux-riscv:
742+upstream_linux-riscv: needs-triage
743+trusty_linux-riscv: DNE
744+xenial_linux-riscv: DNE
745+bionic_linux-riscv: DNE
746+focal_linux-riscv: ignored (superseded by linux-riscv-5.8)
747+jammy_linux-riscv: needs-triage
748+kinetic_linux-riscv: needs-triage
749+devel_linux-riscv: needs-triage
750+
751+Patches_linux-riscv-5.8:
752+upstream_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11)
753+trusty_linux-riscv-5.8: DNE
754+xenial_linux-riscv-5.8: DNE
755+bionic_linux-riscv-5.8: DNE
756+focal_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11)
757+jammy_linux-riscv-5.8: DNE
758+kinetic_linux-riscv-5.8: DNE
759+
760+Patches_linux-riscv-5.11:
761+upstream_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13)
762+trusty_linux-riscv-5.11: DNE
763+xenial_linux-riscv-5.11: DNE
764+bionic_linux-riscv-5.11: DNE
765+focal_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13)
766+jammy_linux-riscv-5.11: DNE
767+kinetic_linux-riscv-5.11: DNE
768+
769+Patches_linux-snapdragon:
770+upstream_linux-snapdragon: needs-triage
771+trusty_linux-snapdragon: DNE
772+xenial_linux-snapdragon: ignored (end of standard support)
773+bionic_linux-snapdragon: needs-triage
774+focal_linux-snapdragon: DNE
775+jammy_linux-snapdragon: DNE
776+kinetic_linux-snapdragon: DNE
777diff --git a/active/CVE-2022-20566 b/active/CVE-2022-20566
778new file mode 100644
779index 0000000..5228ae3
780--- /dev/null
781+++ b/active/CVE-2022-20566
782@@ -0,0 +1,757 @@
783+Candidate: CVE-2022-20566
784+PublicDate: 2022-12-06
785+References:
786+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20566
787+ https://git.kernel.org/linus/d0be8347c623e0ac4202a1d4e0373882821f56b0
788+Description:
789+ [Unknown description]
790+Ubuntu-Description:
791+Notes:
792+Mitigation:
793+Bugs:
794+Priority: medium
795+Discovered-by:
796+Assigned-to:
797+CVSS:
798+
799+Patches_linux:
800+ break-fix: - d0be8347c623e0ac4202a1d4e0373882821f56b0
801+upstream_linux: released (5.18.16-1)
802+esm-infra/xenial_linux: needs-triage
803+trusty_linux: ignored (out of standard support)
804+xenial_linux: ignored (out of standard support)
805+bionic_linux: needs-triage
806+focal_linux: needs-triage
807+jammy_linux: needs-triage
808+kinetic_linux: not-affected (5.19.0-26.27)
809+trusty/esm_linux: not-affected
810+devel_linux: not-affected
811+
812+Patches_linux-hwe:
813+upstream_linux-hwe: needs-triage
814+esm-infra/xenial_linux-hwe: needs-triage
815+trusty_linux-hwe: DNE
816+xenial_linux-hwe: ignored (end of standard support)
817+bionic_linux-hwe: ignored (replaced by linux-hwe-5.4)
818+focal_linux-hwe: DNE
819+jammy_linux-hwe: DNE
820+kinetic_linux-hwe: DNE
821+
822+Patches_linux-hwe-5.4:
823+upstream_linux-hwe-5.4: needs-triage
824+trusty_linux-hwe-5.4: DNE
825+xenial_linux-hwe-5.4: DNE
826+bionic_linux-hwe-5.4: needs-triage
827+focal_linux-hwe-5.4: DNE
828+jammy_linux-hwe-5.4: DNE
829+kinetic_linux-hwe-5.4: DNE
830+
831+Patches_linux-hwe-5.8:
832+upstream_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11)
833+trusty_linux-hwe-5.8: DNE
834+xenial_linux-hwe-5.8: DNE
835+bionic_linux-hwe-5.8: DNE
836+focal_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11)
837+jammy_linux-hwe-5.8: DNE
838+kinetic_linux-hwe-5.8: DNE
839+
840+Patches_linux-hwe-5.11:
841+upstream_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13)
842+trusty_linux-hwe-5.11: DNE
843+xenial_linux-hwe-5.11: DNE
844+bionic_linux-hwe-5.11: DNE
845+focal_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13)
846+jammy_linux-hwe-5.11: DNE
847+kinetic_linux-hwe-5.11: DNE
848+
849+Patches_linux-hwe-5.13:
850+upstream_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15)
851+trusty_linux-hwe-5.13: DNE
852+xenial_linux-hwe-5.13: DNE
853+bionic_linux-hwe-5.13: DNE
854+focal_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15)
855+jammy_linux-hwe-5.13: DNE
856+kinetic_linux-hwe-5.13: DNE
857+
858+Patches_linux-hwe-5.15:
859+upstream_linux-hwe-5.15: needs-triage
860+trusty_linux-hwe-5.15: DNE
861+xenial_linux-hwe-5.15: DNE
862+bionic_linux-hwe-5.15: DNE
863+focal_linux-hwe-5.15: needs-triage
864+jammy_linux-hwe-5.15: DNE
865+kinetic_linux-hwe-5.15: DNE
866+
867+Patches_linux-hwe-edge:
868+upstream_linux-hwe-edge: needs-triage
869+esm-infra/xenial_linux-hwe-edge: ignored (superseded by linux-hwe)
870+trusty_linux-hwe-edge: DNE
871+xenial_linux-hwe-edge: ignored (superseded by linux-hwe)
872+bionic_linux-hwe-edge: ignored (superseded by linux-hwe-5.4)
873+focal_linux-hwe-edge: DNE
874+jammy_linux-hwe-edge: DNE
875+kinetic_linux-hwe-edge: DNE
876+
877+Patches_linux-lts-xenial:
878+upstream_linux-lts-xenial: needs-triage
879+trusty_linux-lts-xenial: ignored (out of standard support)
880+xenial_linux-lts-xenial: DNE
881+bionic_linux-lts-xenial: DNE
882+focal_linux-lts-xenial: DNE
883+jammy_linux-lts-xenial: DNE
884+kinetic_linux-lts-xenial: DNE
885+trusty/esm_linux-lts-xenial: needs-triage
886+
887+Patches_linux-kvm:
888+upstream_linux-kvm: needs-triage
889+esm-infra/xenial_linux-kvm: needs-triage
890+trusty_linux-kvm: DNE
891+xenial_linux-kvm: ignored (end of standard support)
892+bionic_linux-kvm: needs-triage
893+focal_linux-kvm: needs-triage
894+jammy_linux-kvm: needs-triage
895+kinetic_linux-kvm: needs-triage
896+devel_linux-kvm: needs-triage
897+
898+Patches_linux-aws:
899+upstream_linux-aws: needs-triage
900+esm-infra/xenial_linux-aws: needs-triage
901+trusty_linux-aws: ignored (out of standard support)
902+xenial_linux-aws: ignored (end of standard support)
903+bionic_linux-aws: needs-triage
904+focal_linux-aws: needs-triage
905+jammy_linux-aws: needs-triage
906+kinetic_linux-aws: needs-triage
907+trusty/esm_linux-aws: needs-triage
908+devel_linux-aws: needs-triage
909+
910+Patches_linux-aws-5.0:
911+upstream_linux-aws-5.0: needs-triage
912+trusty_linux-aws-5.0: DNE
913+xenial_linux-aws-5.0: DNE
914+bionic_linux-aws-5.0: ignored (superseded by linux-aws-5.3)
915+focal_linux-aws-5.0: DNE
916+jammy_linux-aws-5.0: DNE
917+kinetic_linux-aws-5.0: DNE
918+
919+Patches_linux-aws-5.3:
920+upstream_linux-aws-5.3: ignored (superseded by linux-aws-5.4)
921+trusty_linux-aws-5.3: DNE
922+xenial_linux-aws-5.3: DNE
923+bionic_linux-aws-5.3: ignored (superseded by linux-aws-5.4)
924+focal_linux-aws-5.3: DNE
925+jammy_linux-aws-5.3: DNE
926+kinetic_linux-aws-5.3: DNE
927+
928+Patches_linux-aws-5.4:
929+upstream_linux-aws-5.4: needs-triage
930+trusty_linux-aws-5.4: DNE
931+xenial_linux-aws-5.4: DNE
932+bionic_linux-aws-5.4: needs-triage
933+focal_linux-aws-5.4: DNE
934+jammy_linux-aws-5.4: DNE
935+kinetic_linux-aws-5.4: DNE
936+
937+Patches_linux-aws-5.8:
938+upstream_linux-aws-5.8: ignored (superseded by linux-aws-5.11)
939+trusty_linux-aws-5.8: DNE
940+xenial_linux-aws-5.8: DNE
941+bionic_linux-aws-5.8: DNE
942+focal_linux-aws-5.8: ignored (superseded by linux-aws-5.11)
943+jammy_linux-aws-5.8: DNE
944+kinetic_linux-aws-5.8: DNE
945+
946+Patches_linux-aws-5.11:
947+upstream_linux-aws-5.11: ignored (superseded by linux-aws-5.13)
948+trusty_linux-aws-5.11: DNE
949+xenial_linux-aws-5.11: DNE
950+bionic_linux-aws-5.11: DNE
951+focal_linux-aws-5.11: ignored (superseded by linux-aws-5.13)
952+jammy_linux-aws-5.11: DNE
953+kinetic_linux-aws-5.11: DNE
954+
955+Patches_linux-aws-5.13:
956+upstream_linux-aws-5.13: ignored (superseded by linux-aws-5.15)
957+trusty_linux-aws-5.13: DNE
958+xenial_linux-aws-5.13: DNE
959+bionic_linux-aws-5.13: DNE
960+focal_linux-aws-5.13: ignored (superseded by linux-aws-5.15)
961+jammy_linux-aws-5.13: DNE
962+kinetic_linux-aws-5.13: DNE
963+
964+Patches_linux-aws-5.15:
965+upstream_linux-aws-5.15: needs-triage
966+trusty_linux-aws-5.15: DNE
967+xenial_linux-aws-5.15: DNE
968+bionic_linux-aws-5.15: DNE
969+focal_linux-aws-5.15: needs-triage
970+jammy_linux-aws-5.15: DNE
971+kinetic_linux-aws-5.15: DNE
972+
973+Patches_linux-aws-hwe:
974+upstream_linux-aws-hwe: needs-triage
975+esm-infra/xenial_linux-aws-hwe: needs-triage
976+trusty_linux-aws-hwe: DNE
977+xenial_linux-aws-hwe: ignored (end of standard support)
978+bionic_linux-aws-hwe: DNE
979+focal_linux-aws-hwe: DNE
980+jammy_linux-aws-hwe: DNE
981+kinetic_linux-aws-hwe: DNE
982+
983+Patches_linux-azure:
984+upstream_linux-azure: needs-triage
985+esm-infra/xenial_linux-azure: needs-triage
986+trusty_linux-azure: ignored (out of standard support)
987+xenial_linux-azure: ignored (end of standard support)
988+bionic_linux-azure: ignored (superseded by linux-azure-5.3)
989+focal_linux-azure: needs-triage
990+jammy_linux-azure: needs-triage
991+kinetic_linux-azure: needs-triage
992+trusty/esm_linux-azure: needs-triage
993+devel_linux-azure: needs-triage
994+
995+Patches_linux-azure-4.15:
996+upstream_linux-azure-4.15: needs-triage
997+trusty_linux-azure-4.15: DNE
998+xenial_linux-azure-4.15: DNE
999+bionic_linux-azure-4.15: needs-triage
1000+focal_linux-azure-4.15: DNE
1001+jammy_linux-azure-4.15: DNE
1002+kinetic_linux-azure-4.15: DNE
1003+
1004+Patches_linux-azure-5.3:
1005+upstream_linux-azure-5.3: ignored (superseded by linux-azure-5.4)
1006+trusty_linux-azure-5.3: DNE
1007+xenial_linux-azure-5.3: DNE
1008+bionic_linux-azure-5.3: ignored (superseded by linux-azure-5.4)
1009+focal_linux-azure-5.3: DNE
1010+jammy_linux-azure-5.3: DNE
1011+kinetic_linux-azure-5.3: DNE
1012+
1013+Patches_linux-azure-5.4:
1014+upstream_linux-azure-5.4: needs-triage
1015+trusty_linux-azure-5.4: DNE
1016+xenial_linux-azure-5.4: DNE
1017+bionic_linux-azure-5.4: needs-triage
1018+focal_linux-azure-5.4: DNE
1019+jammy_linux-azure-5.4: DNE
1020+kinetic_linux-azure-5.4: DNE
1021+
1022+Patches_linux-azure-5.8:
1023+upstream_linux-azure-5.8: ignored (superseded by linux-azure-5.11)
1024+trusty_linux-azure-5.8: DNE
1025+xenial_linux-azure-5.8: DNE
1026+bionic_linux-azure-5.8: DNE
1027+focal_linux-azure-5.8: ignored (superseded by linux-azure-5.11)
1028+jammy_linux-azure-5.8: DNE
1029+kinetic_linux-azure-5.8: DNE
1030+
1031+Patches_linux-azure-5.11:
1032+upstream_linux-azure-5.11: ignored (superseded by linux-azure-5.13)
1033+trusty_linux-azure-5.11: DNE
1034+xenial_linux-azure-5.11: DNE
1035+bionic_linux-azure-5.11: DNE
1036+focal_linux-azure-5.11: ignored (superseded by linux-azure-5.13)
1037+jammy_linux-azure-5.11: DNE
1038+kinetic_linux-azure-5.11: DNE
1039+
1040+Patches_linux-azure-5.13:
1041+upstream_linux-azure-5.13: ignored (superseded by linux-azure-5.15)
1042+trusty_linux-azure-5.13: DNE
1043+xenial_linux-azure-5.13: DNE
1044+bionic_linux-azure-5.13: DNE
1045+focal_linux-azure-5.13: ignored (superseded by linux-azure-5.15)
1046+jammy_linux-azure-5.13: DNE
1047+kinetic_linux-azure-5.13: DNE
1048+
1049+Patches_linux-azure-5.15:
1050+upstream_linux-azure-5.15: needs-triage
1051+trusty_linux-azure-5.15: DNE
1052+xenial_linux-azure-5.15: DNE
1053+bionic_linux-azure-5.15: DNE
1054+focal_linux-azure-5.15: needs-triage
1055+jammy_linux-azure-5.15: DNE
1056+kinetic_linux-azure-5.15: DNE
1057+
1058+Patches_linux-azure-fde:
1059+upstream_linux-azure-fde: needs-triage
1060+trusty_linux-azure-fde: DNE
1061+xenial_linux-azure-fde: DNE
1062+bionic_linux-azure-fde: DNE
1063+focal_linux-azure-fde: needs-triage
1064+jammy_linux-azure-fde: needs-triage
1065+kinetic_linux-azure-fde: DNE
1066+
1067+Patches_linux-azure-fde-5.15:
1068+upstream_linux-azure-fde-5.15: needs-triage
1069+trusty_linux-azure-fde-5.15: DNE
1070+xenial_linux-azure-fde-5.15: DNE
1071+bionic_linux-azure-fde-5.15: DNE
1072+focal_linux-azure-fde-5.15: needs-triage
1073+jammy_linux-azure-fde-5.15: DNE
1074+kinetic_linux-azure-fde-5.15: DNE
1075+
1076+Patches_linux-bluefield:
1077+upstream_linux-bluefield: needs-triage
1078+trusty_linux-bluefield: DNE
1079+xenial_linux-bluefield: DNE
1080+bionic_linux-bluefield: DNE
1081+focal_linux-bluefield: needs-triage
1082+jammy_linux-bluefield: DNE
1083+kinetic_linux-bluefield: DNE
1084+
1085+Patches_linux-dell300x:
1086+upstream_linux-dell300x: needs-triage
1087+trusty_linux-dell300x: DNE
1088+xenial_linux-dell300x: DNE
1089+bionic_linux-dell300x: needs-triage
1090+focal_linux-dell300x: DNE
1091+jammy_linux-dell300x: DNE
1092+kinetic_linux-dell300x: DNE
1093+
1094+Patches_linux-azure-edge:
1095+upstream_linux-azure-edge: needs-triage
1096+trusty_linux-azure-edge: DNE
1097+xenial_linux-azure-edge: DNE
1098+bionic_linux-azure-edge: ignored (superseded by linux-azure-5.3)
1099+focal_linux-azure-edge: DNE
1100+jammy_linux-azure-edge: DNE
1101+kinetic_linux-azure-edge: DNE
1102+
1103+Patches_linux-fips:
1104+upstream_linux-fips: needs-triage
1105+trusty_linux-fips: ignored (out of standard support)
1106+xenial_linux-fips: ignored (out of standard support)
1107+bionic_linux-fips: DNE
1108+focal_linux-fips: DNE
1109+jammy_linux-fips: DNE
1110+kinetic_linux-fips: DNE
1111+fips/xenial_linux-fips: needs-triage
1112+fips/bionic_linux-fips: needs-triage
1113+fips/focal_linux-fips: needs-triage
1114+fips-updates/xenial_linux-fips: needs-triage
1115+fips-updates/bionic_linux-fips: needs-triage
1116+fips-updates/focal_linux-fips: needs-triage
1117+
1118+Patches_linux-gcp:
1119+upstream_linux-gcp: needs-triage
1120+esm-infra/xenial_linux-gcp: needs-triage
1121+trusty_linux-gcp: DNE
1122+xenial_linux-gcp: ignored (end of standard support)
1123+bionic_linux-gcp: ignored (superseded by linux-gcp-5.3)
1124+focal_linux-gcp: needs-triage
1125+jammy_linux-gcp: needs-triage
1126+kinetic_linux-gcp: needs-triage
1127+devel_linux-gcp: needs-triage
1128+
1129+Patches_linux-gcp-4.15:
1130+upstream_linux-gcp-4.15: needs-triage
1131+trusty_linux-gcp-4.15: DNE
1132+xenial_linux-gcp-4.15: DNE
1133+bionic_linux-gcp-4.15: needs-triage
1134+focal_linux-gcp-4.15: DNE
1135+jammy_linux-gcp-4.15: DNE
1136+kinetic_linux-gcp-4.15: DNE
1137+
1138+Patches_linux-gcp-5.3:
1139+upstream_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4)
1140+trusty_linux-gcp-5.3: DNE
1141+xenial_linux-gcp-5.3: DNE
1142+bionic_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4)
1143+focal_linux-gcp-5.3: DNE
1144+jammy_linux-gcp-5.3: DNE
1145+kinetic_linux-gcp-5.3: DNE
1146+
1147+Patches_linux-gcp-5.4:
1148+upstream_linux-gcp-5.4: needs-triage
1149+trusty_linux-gcp-5.4: DNE
1150+xenial_linux-gcp-5.4: DNE
1151+bionic_linux-gcp-5.4: needs-triage
1152+focal_linux-gcp-5.4: DNE
1153+jammy_linux-gcp-5.4: DNE
1154+kinetic_linux-gcp-5.4: DNE
1155+
1156+Patches_linux-gcp-5.8:
1157+upstream_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11)
1158+trusty_linux-gcp-5.8: DNE
1159+xenial_linux-gcp-5.8: DNE
1160+bionic_linux-gcp-5.8: DNE
1161+focal_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11)
1162+jammy_linux-gcp-5.8: DNE
1163+kinetic_linux-gcp-5.8: DNE
1164+
1165+Patches_linux-gcp-5.11:
1166+upstream_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13)
1167+trusty_linux-gcp-5.11: DNE
1168+xenial_linux-gcp-5.11: DNE
1169+bionic_linux-gcp-5.11: DNE
1170+focal_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13)
1171+jammy_linux-gcp-5.11: DNE
1172+kinetic_linux-gcp-5.11: DNE
1173+
1174+Patches_linux-gcp-5.13:
1175+upstream_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15)
1176+trusty_linux-gcp-5.13: DNE
1177+xenial_linux-gcp-5.13: DNE
1178+bionic_linux-gcp-5.13: DNE
1179+focal_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15)
1180+jammy_linux-gcp-5.13: DNE
1181+kinetic_linux-gcp-5.13: DNE
1182+
1183+Patches_linux-gcp-5.15:
1184+upstream_linux-gcp-5.15: needs-triage
1185+trusty_linux-gcp-5.15: DNE
1186+xenial_linux-gcp-5.15: DNE
1187+bionic_linux-gcp-5.15: DNE
1188+focal_linux-gcp-5.15: needs-triage
1189+jammy_linux-gcp-5.15: DNE
1190+kinetic_linux-gcp-5.15: DNE
1191+
1192+Patches_linux-gke:
1193+upstream_linux-gke: needs-triage
1194+trusty_linux-gke: DNE
1195+xenial_linux-gke: ignored (reached end of standard support)
1196+bionic_linux-gke: DNE
1197+focal_linux-gke: needs-triage
1198+jammy_linux-gke: needs-triage
1199+kinetic_linux-gke: DNE
1200+
1201+Patches_linux-gke-4.15:
1202+upstream_linux-gke-4.15: needs-triage
1203+trusty_linux-gke-4.15: DNE
1204+xenial_linux-gke-4.15: DNE
1205+bionic_linux-gke-4.15: needs-triage
1206+focal_linux-gke-4.15: DNE
1207+jammy_linux-gke-4.15: DNE
1208+kinetic_linux-gke-4.15: DNE
1209+
1210+Patches_linux-gke-5.0:
1211+upstream_linux-gke-5.0: needs-triage
1212+trusty_linux-gke-5.0: DNE
1213+xenial_linux-gke-5.0: DNE
1214+bionic_linux-gke-5.0: ignored (superseded by linux-gke-5.3)
1215+focal_linux-gke-5.0: DNE
1216+jammy_linux-gke-5.0: DNE
1217+kinetic_linux-gke-5.0: DNE
1218+
1219+Patches_linux-gke-5.3:
1220+upstream_linux-gke-5.3: ignored (superseded by linux-gke-5.4)
1221+trusty_linux-gke-5.3: DNE
1222+xenial_linux-gke-5.3: DNE
1223+bionic_linux-gke-5.3: ignored (superseded by linux-gke-5.4)
1224+focal_linux-gke-5.3: DNE
1225+jammy_linux-gke-5.3: DNE
1226+kinetic_linux-gke-5.3: DNE
1227+
1228+Patches_linux-gke-5.4:
1229+upstream_linux-gke-5.4: needs-triage
1230+trusty_linux-gke-5.4: DNE
1231+xenial_linux-gke-5.4: DNE
1232+bionic_linux-gke-5.4: needs-triage
1233+focal_linux-gke-5.4: DNE
1234+jammy_linux-gke-5.4: DNE
1235+kinetic_linux-gke-5.4: DNE
1236+
1237+Patches_linux-gke-5.15:
1238+upstream_linux-gke-5.15: needs-triage
1239+trusty_linux-gke-5.15: DNE
1240+xenial_linux-gke-5.15: DNE
1241+bionic_linux-gke-5.15: DNE
1242+focal_linux-gke-5.15: needs-triage
1243+jammy_linux-gke-5.15: DNE
1244+kinetic_linux-gke-5.15: DNE
1245+
1246+Patches_linux-gkeop:
1247+upstream_linux-gkeop: needs-triage
1248+trusty_linux-gkeop: DNE
1249+xenial_linux-gkeop: DNE
1250+bionic_linux-gkeop: DNE
1251+focal_linux-gkeop: needs-triage
1252+jammy_linux-gkeop: needs-triage
1253+kinetic_linux-gkeop: DNE
1254+
1255+Patches_linux-gkeop-5.4:
1256+upstream_linux-gkeop-5.4: needs-triage
1257+trusty_linux-gkeop-5.4: DNE
1258+xenial_linux-gkeop-5.4: DNE
1259+bionic_linux-gkeop-5.4: needs-triage
1260+focal_linux-gkeop-5.4: DNE
1261+jammy_linux-gkeop-5.4: DNE
1262+kinetic_linux-gkeop-5.4: DNE
1263+
1264+Patches_linux-ibm:
1265+upstream_linux-ibm: needs-triage
1266+trusty_linux-ibm: DNE
1267+xenial_linux-ibm: DNE
1268+bionic_linux-ibm: DNE
1269+focal_linux-ibm: needs-triage
1270+jammy_linux-ibm: needs-triage
1271+kinetic_linux-ibm: needs-triage
1272+devel_linux-ibm: needs-triage
1273+
1274+Patches_linux-ibm-5.4:
1275+upstream_linux-ibm-5.4: needs-triage
1276+trusty_linux-ibm-5.4: DNE
1277+xenial_linux-ibm-5.4: DNE
1278+bionic_linux-ibm-5.4: needs-triage
1279+focal_linux-ibm-5.4: DNE
1280+jammy_linux-ibm-5.4: DNE
1281+kinetic_linux-ibm-5.4: DNE
1282+
1283+Patches_linux-intel-5.13:
1284+upstream_linux-intel-5.13: needs-triage
1285+trusty_linux-intel-5.13: DNE
1286+xenial_linux-intel-5.13: DNE
1287+bionic_linux-intel-5.13: DNE
1288+focal_linux-intel-5.13: needs-triage
1289+jammy_linux-intel-5.13: DNE
1290+kinetic_linux-intel-5.13: DNE
1291+
1292+Patches_linux-intel-iotg:
1293+upstream_linux-intel-iotg: needs-triage
1294+trusty_linux-intel-iotg: DNE
1295+xenial_linux-intel-iotg: DNE
1296+bionic_linux-intel-iotg: DNE
1297+focal_linux-intel-iotg: DNE
1298+jammy_linux-intel-iotg: needs-triage
1299+kinetic_linux-intel-iotg: DNE
1300+
1301+Patches_linux-intel-iotg-5.15:
1302+upstream_linux-intel-iotg-5.15: needs-triage
1303+trusty_linux-intel-iotg-5.15: DNE
1304+xenial_linux-intel-iotg-5.15: DNE
1305+bionic_linux-intel-iotg-5.15: DNE
1306+focal_linux-intel-iotg-5.15: needs-triage
1307+jammy_linux-intel-iotg-5.15: DNE
1308+kinetic_linux-intel-iotg-5.15: DNE
1309+
1310+Patches_linux-lowlatency:
1311+upstream_linux-lowlatency: needs-triage
1312+trusty_linux-lowlatency: DNE
1313+xenial_linux-lowlatency: DNE
1314+bionic_linux-lowlatency: DNE
1315+focal_linux-lowlatency: DNE
1316+jammy_linux-lowlatency: needs-triage
1317+kinetic_linux-lowlatency: needs-triage
1318+devel_linux-lowlatency: needs-triage
1319+
1320+Patches_linux-lowlatency-hwe-5.15:
1321+upstream_linux-lowlatency-hwe-5.15: needs-triage
1322+trusty_linux-lowlatency-hwe-5.15: DNE
1323+xenial_linux-lowlatency-hwe-5.15: DNE
1324+bionic_linux-lowlatency-hwe-5.15: DNE
1325+focal_linux-lowlatency-hwe-5.15: needs-triage
1326+jammy_linux-lowlatency-hwe-5.15: DNE
1327+kinetic_linux-lowlatency-hwe-5.15: DNE
1328+
1329+Patches_linux-oracle:
1330+upstream_linux-oracle: needs-triage
1331+esm-infra/xenial_linux-oracle: needs-triage
1332+trusty_linux-oracle: DNE
1333+xenial_linux-oracle: ignored (end of standard support)
1334+bionic_linux-oracle: needs-triage
1335+focal_linux-oracle: needs-triage
1336+jammy_linux-oracle: needs-triage
1337+kinetic_linux-oracle: needs-triage
1338+devel_linux-oracle: needs-triage
1339+
1340+Patches_linux-oracle-5.0:
1341+upstream_linux-oracle-5.0: needs-triage
1342+trusty_linux-oracle-5.0: DNE
1343+xenial_linux-oracle-5.0: DNE
1344+bionic_linux-oracle-5.0: ignored (superseded by linux-oracle-5.3)
1345+focal_linux-oracle-5.0: DNE
1346+jammy_linux-oracle-5.0: DNE
1347+kinetic_linux-oracle-5.0: DNE
1348+
1349+Patches_linux-oracle-5.3:
1350+upstream_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4)
1351+trusty_linux-oracle-5.3: DNE
1352+xenial_linux-oracle-5.3: DNE
1353+bionic_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4)
1354+focal_linux-oracle-5.3: DNE
1355+jammy_linux-oracle-5.3: DNE
1356+kinetic_linux-oracle-5.3: DNE
1357+
1358+Patches_linux-oracle-5.4:
1359+upstream_linux-oracle-5.4: needs-triage
1360+trusty_linux-oracle-5.4: DNE
1361+xenial_linux-oracle-5.4: DNE
1362+bionic_linux-oracle-5.4: needs-triage
1363+focal_linux-oracle-5.4: DNE
1364+jammy_linux-oracle-5.4: DNE
1365+kinetic_linux-oracle-5.4: DNE
1366+
1367+Patches_linux-oracle-5.8:
1368+upstream_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11)
1369+trusty_linux-oracle-5.8: DNE
1370+xenial_linux-oracle-5.8: DNE
1371+bionic_linux-oracle-5.8: DNE
1372+focal_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11)
1373+jammy_linux-oracle-5.8: DNE
1374+kinetic_linux-oracle-5.8: DNE
1375+
1376+Patches_linux-oracle-5.11:
1377+upstream_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13)
1378+trusty_linux-oracle-5.11: DNE
1379+xenial_linux-oracle-5.11: DNE
1380+bionic_linux-oracle-5.11: DNE
1381+focal_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13)
1382+jammy_linux-oracle-5.11: DNE
1383+kinetic_linux-oracle-5.11: DNE
1384+
1385+Patches_linux-oracle-5.13:
1386+upstream_linux-oracle-5.13: needs-triage
1387+trusty_linux-oracle-5.13: DNE
1388+xenial_linux-oracle-5.13: DNE
1389+bionic_linux-oracle-5.13: DNE
1390+focal_linux-oracle-5.13: needs-triage
1391+jammy_linux-oracle-5.13: DNE
1392+kinetic_linux-oracle-5.13: DNE
1393+
1394+Patches_linux-oracle-5.15:
1395+upstream_linux-oracle-5.15: needs-triage
1396+trusty_linux-oracle-5.15: DNE
1397+xenial_linux-oracle-5.15: DNE
1398+bionic_linux-oracle-5.15: DNE
1399+focal_linux-oracle-5.15: needs-triage
1400+jammy_linux-oracle-5.15: DNE
1401+kinetic_linux-oracle-5.15: DNE
1402+
1403+Patches_linux-oem:
1404+upstream_linux-oem: needs-triage
1405+trusty_linux-oem: DNE
1406+xenial_linux-oem: ignored (superseded by linux-hwe)
1407+bionic_linux-oem: needs-triage
1408+focal_linux-oem: DNE
1409+jammy_linux-oem: DNE
1410+kinetic_linux-oem: DNE
1411+
1412+Patches_linux-oem-5.6:
1413+upstream_linux-oem-5.6: needs-triage
1414+trusty_linux-oem-5.6: DNE
1415+xenial_linux-oem-5.6: DNE
1416+bionic_linux-oem-5.6: DNE
1417+focal_linux-oem-5.6: needs-triage
1418+jammy_linux-oem-5.6: DNE
1419+kinetic_linux-oem-5.6: DNE
1420+
1421+Patches_linux-oem-5.10:
1422+upstream_linux-oem-5.10: needs-triage
1423+trusty_linux-oem-5.10: DNE
1424+xenial_linux-oem-5.10: DNE
1425+bionic_linux-oem-5.10: DNE
1426+focal_linux-oem-5.10: needs-triage
1427+jammy_linux-oem-5.10: DNE
1428+kinetic_linux-oem-5.10: DNE
1429+
1430+Patches_linux-oem-5.13:
1431+upstream_linux-oem-5.13: ignored (superseded by linux-oem-5.14)
1432+trusty_linux-oem-5.13: DNE
1433+xenial_linux-oem-5.13: DNE
1434+bionic_linux-oem-5.13: DNE
1435+focal_linux-oem-5.13: ignored (superseded by linux-oem-5.14)
1436+jammy_linux-oem-5.13: DNE
1437+kinetic_linux-oem-5.13: DNE
1438+
1439+Patches_linux-oem-5.14:
1440+upstream_linux-oem-5.14: needs-triage
1441+trusty_linux-oem-5.14: DNE
1442+xenial_linux-oem-5.14: DNE
1443+bionic_linux-oem-5.14: DNE
1444+focal_linux-oem-5.14: needs-triage
1445+jammy_linux-oem-5.14: DNE
1446+kinetic_linux-oem-5.14: DNE
1447+
1448+Patches_linux-oem-5.17:
1449+upstream_linux-oem-5.17: needs-triage
1450+trusty_linux-oem-5.17: DNE
1451+xenial_linux-oem-5.17: DNE
1452+bionic_linux-oem-5.17: DNE
1453+focal_linux-oem-5.17: DNE
1454+jammy_linux-oem-5.17: needs-triage
1455+kinetic_linux-oem-5.17: needs-triage
1456+devel_linux-oem-5.17: needs-triage
1457+
1458+Patches_linux-oem-osp1:
1459+upstream_linux-oem-osp1: needs-triage
1460+trusty_linux-oem-osp1: DNE
1461+xenial_linux-oem-osp1: DNE
1462+bionic_linux-oem-osp1: needs-triage
1463+focal_linux-oem-osp1: DNE
1464+jammy_linux-oem-osp1: DNE
1465+kinetic_linux-oem-osp1: DNE
1466+
1467+Patches_linux-raspi:
1468+upstream_linux-raspi: needs-triage
1469+trusty_linux-raspi: DNE
1470+xenial_linux-raspi: DNE
1471+bionic_linux-raspi: DNE
1472+focal_linux-raspi: needs-triage
1473+jammy_linux-raspi: needs-triage
1474+kinetic_linux-raspi: needs-triage
1475+devel_linux-raspi: needs-triage
1476+
1477+Patches_linux-raspi2:
1478+upstream_linux-raspi2: needs-triage
1479+trusty_linux-raspi2: DNE
1480+xenial_linux-raspi2: ignored (end of standard support)
1481+bionic_linux-raspi2: needs-triage
1482+focal_linux-raspi2: ignored (replaced by linux-raspi)
1483+jammy_linux-raspi2: DNE
1484+kinetic_linux-raspi2: DNE
1485+
1486+Patches_linux-raspi2-5.3:
1487+upstream_linux-raspi2-5.3: ignored (superseded by linux-raspi2-5.4)
1488+trusty_linux-raspi2-5.3: DNE
1489+xenial_linux-raspi2-5.3: DNE
1490+bionic_linux-raspi2-5.3: ignored (superseded by linux-raspi-5.4)
1491+focal_linux-raspi2-5.3: DNE
1492+jammy_linux-raspi2-5.3: DNE
1493+kinetic_linux-raspi2-5.3: DNE
1494+
1495+Patches_linux-raspi-5.4:
1496+upstream_linux-raspi-5.4: needs-triage
1497+trusty_linux-raspi-5.4: DNE
1498+xenial_linux-raspi-5.4: DNE
1499+bionic_linux-raspi-5.4: needs-triage
1500+focal_linux-raspi-5.4: DNE
1501+jammy_linux-raspi-5.4: DNE
1502+kinetic_linux-raspi-5.4: DNE
1503+
1504+Patches_linux-riscv:
1505+upstream_linux-riscv: needs-triage
1506+trusty_linux-riscv: DNE
1507+xenial_linux-riscv: DNE
1508+bionic_linux-riscv: DNE
1509+focal_linux-riscv: ignored (superseded by linux-riscv-5.8)
1510+jammy_linux-riscv: needs-triage
1511+kinetic_linux-riscv: needs-triage
1512+devel_linux-riscv: needs-triage
1513+
1514+Patches_linux-riscv-5.8:
1515+upstream_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11)
1516+trusty_linux-riscv-5.8: DNE
1517+xenial_linux-riscv-5.8: DNE
1518+bionic_linux-riscv-5.8: DNE
1519+focal_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11)
1520+jammy_linux-riscv-5.8: DNE
1521+kinetic_linux-riscv-5.8: DNE
1522+
1523+Patches_linux-riscv-5.11:
1524+upstream_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13)
1525+trusty_linux-riscv-5.11: DNE
1526+xenial_linux-riscv-5.11: DNE
1527+bionic_linux-riscv-5.11: DNE
1528+focal_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13)
1529+jammy_linux-riscv-5.11: DNE
1530+kinetic_linux-riscv-5.11: DNE
1531+
1532+Patches_linux-snapdragon:
1533+upstream_linux-snapdragon: needs-triage
1534+trusty_linux-snapdragon: DNE
1535+xenial_linux-snapdragon: ignored (end of standard support)
1536+bionic_linux-snapdragon: needs-triage
1537+focal_linux-snapdragon: DNE
1538+jammy_linux-snapdragon: DNE
1539+kinetic_linux-snapdragon: DNE
1540diff --git a/active/CVE-2022-20567 b/active/CVE-2022-20567
1541new file mode 100644
1542index 0000000..d3f5620
1543--- /dev/null
1544+++ b/active/CVE-2022-20567
1545@@ -0,0 +1,757 @@
1546+Candidate: CVE-2022-20567
1547+PublicDate: 2022-12-06
1548+References:
1549+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20567
1550+ https://git.kernel.org/linus/d02ba2a6110c530a32926af8ad441111774d2893
1551+Description:
1552+ [Unknown description]
1553+Ubuntu-Description:
1554+Notes:
1555+Mitigation:
1556+Bugs:
1557+Priority: medium
1558+Discovered-by:
1559+Assigned-to:
1560+CVSS:
1561+
1562+Patches_linux:
1563+ break-fix: ee40fb2e1eb5bc0ddd3f2f83c6e39a454ef5a741 d02ba2a6110c530a32926af8ad441111774d2893
1564+upstream_linux: released (4.15.11-1)
1565+esm-infra/xenial_linux: needs-triage
1566+trusty_linux: ignored (out of standard support)
1567+xenial_linux: ignored (out of standard support)
1568+bionic_linux: needs-triage
1569+focal_linux: not-affected (5.4.0-135.152)
1570+jammy_linux: not-affected
1571+kinetic_linux: not-affected
1572+trusty/esm_linux: not-affected
1573+devel_linux: not-affected
1574+
1575+Patches_linux-hwe:
1576+upstream_linux-hwe: needs-triage
1577+esm-infra/xenial_linux-hwe: needs-triage
1578+trusty_linux-hwe: DNE
1579+xenial_linux-hwe: ignored (end of standard support)
1580+bionic_linux-hwe: ignored (replaced by linux-hwe-5.4)
1581+focal_linux-hwe: DNE
1582+jammy_linux-hwe: DNE
1583+kinetic_linux-hwe: DNE
1584+
1585+Patches_linux-hwe-5.4:
1586+upstream_linux-hwe-5.4: needs-triage
1587+trusty_linux-hwe-5.4: DNE
1588+xenial_linux-hwe-5.4: DNE
1589+bionic_linux-hwe-5.4: needs-triage
1590+focal_linux-hwe-5.4: DNE
1591+jammy_linux-hwe-5.4: DNE
1592+kinetic_linux-hwe-5.4: DNE
1593+
1594+Patches_linux-hwe-5.8:
1595+upstream_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11)
1596+trusty_linux-hwe-5.8: DNE
1597+xenial_linux-hwe-5.8: DNE
1598+bionic_linux-hwe-5.8: DNE
1599+focal_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11)
1600+jammy_linux-hwe-5.8: DNE
1601+kinetic_linux-hwe-5.8: DNE
1602+
1603+Patches_linux-hwe-5.11:
1604+upstream_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13)
1605+trusty_linux-hwe-5.11: DNE
1606+xenial_linux-hwe-5.11: DNE
1607+bionic_linux-hwe-5.11: DNE
1608+focal_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13)
1609+jammy_linux-hwe-5.11: DNE
1610+kinetic_linux-hwe-5.11: DNE
1611+
1612+Patches_linux-hwe-5.13:
1613+upstream_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15)
1614+trusty_linux-hwe-5.13: DNE
1615+xenial_linux-hwe-5.13: DNE
1616+bionic_linux-hwe-5.13: DNE
1617+focal_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15)
1618+jammy_linux-hwe-5.13: DNE
1619+kinetic_linux-hwe-5.13: DNE
1620+
1621+Patches_linux-hwe-5.15:
1622+upstream_linux-hwe-5.15: needs-triage
1623+trusty_linux-hwe-5.15: DNE
1624+xenial_linux-hwe-5.15: DNE
1625+bionic_linux-hwe-5.15: DNE
1626+focal_linux-hwe-5.15: needs-triage
1627+jammy_linux-hwe-5.15: DNE
1628+kinetic_linux-hwe-5.15: DNE
1629+
1630+Patches_linux-hwe-edge:
1631+upstream_linux-hwe-edge: needs-triage
1632+esm-infra/xenial_linux-hwe-edge: ignored (superseded by linux-hwe)
1633+trusty_linux-hwe-edge: DNE
1634+xenial_linux-hwe-edge: ignored (superseded by linux-hwe)
1635+bionic_linux-hwe-edge: ignored (superseded by linux-hwe-5.4)
1636+focal_linux-hwe-edge: DNE
1637+jammy_linux-hwe-edge: DNE
1638+kinetic_linux-hwe-edge: DNE
1639+
1640+Patches_linux-lts-xenial:
1641+upstream_linux-lts-xenial: needs-triage
1642+trusty_linux-lts-xenial: ignored (out of standard support)
1643+xenial_linux-lts-xenial: DNE
1644+bionic_linux-lts-xenial: DNE
1645+focal_linux-lts-xenial: DNE
1646+jammy_linux-lts-xenial: DNE
1647+kinetic_linux-lts-xenial: DNE
1648+trusty/esm_linux-lts-xenial: needs-triage
1649+
1650+Patches_linux-kvm:
1651+upstream_linux-kvm: needs-triage
1652+esm-infra/xenial_linux-kvm: needs-triage
1653+trusty_linux-kvm: DNE
1654+xenial_linux-kvm: ignored (end of standard support)
1655+bionic_linux-kvm: needs-triage
1656+focal_linux-kvm: needs-triage
1657+jammy_linux-kvm: needs-triage
1658+kinetic_linux-kvm: needs-triage
1659+devel_linux-kvm: needs-triage
1660+
1661+Patches_linux-aws:
1662+upstream_linux-aws: needs-triage
1663+esm-infra/xenial_linux-aws: needs-triage
1664+trusty_linux-aws: ignored (out of standard support)
1665+xenial_linux-aws: ignored (end of standard support)
1666+bionic_linux-aws: needs-triage
1667+focal_linux-aws: needs-triage
1668+jammy_linux-aws: needs-triage
1669+kinetic_linux-aws: needs-triage
1670+trusty/esm_linux-aws: needs-triage
1671+devel_linux-aws: needs-triage
1672+
1673+Patches_linux-aws-5.0:
1674+upstream_linux-aws-5.0: needs-triage
1675+trusty_linux-aws-5.0: DNE
1676+xenial_linux-aws-5.0: DNE
1677+bionic_linux-aws-5.0: ignored (superseded by linux-aws-5.3)
1678+focal_linux-aws-5.0: DNE
1679+jammy_linux-aws-5.0: DNE
1680+kinetic_linux-aws-5.0: DNE
1681+
1682+Patches_linux-aws-5.3:
1683+upstream_linux-aws-5.3: ignored (superseded by linux-aws-5.4)
1684+trusty_linux-aws-5.3: DNE
1685+xenial_linux-aws-5.3: DNE
1686+bionic_linux-aws-5.3: ignored (superseded by linux-aws-5.4)
1687+focal_linux-aws-5.3: DNE
1688+jammy_linux-aws-5.3: DNE
1689+kinetic_linux-aws-5.3: DNE
1690+
1691+Patches_linux-aws-5.4:
1692+upstream_linux-aws-5.4: needs-triage
1693+trusty_linux-aws-5.4: DNE
1694+xenial_linux-aws-5.4: DNE
1695+bionic_linux-aws-5.4: needs-triage
1696+focal_linux-aws-5.4: DNE
1697+jammy_linux-aws-5.4: DNE
1698+kinetic_linux-aws-5.4: DNE
1699+
1700+Patches_linux-aws-5.8:
1701+upstream_linux-aws-5.8: ignored (superseded by linux-aws-5.11)
1702+trusty_linux-aws-5.8: DNE
1703+xenial_linux-aws-5.8: DNE
1704+bionic_linux-aws-5.8: DNE
1705+focal_linux-aws-5.8: ignored (superseded by linux-aws-5.11)
1706+jammy_linux-aws-5.8: DNE
1707+kinetic_linux-aws-5.8: DNE
1708+
1709+Patches_linux-aws-5.11:
1710+upstream_linux-aws-5.11: ignored (superseded by linux-aws-5.13)
1711+trusty_linux-aws-5.11: DNE
1712+xenial_linux-aws-5.11: DNE
1713+bionic_linux-aws-5.11: DNE
1714+focal_linux-aws-5.11: ignored (superseded by linux-aws-5.13)
1715+jammy_linux-aws-5.11: DNE
1716+kinetic_linux-aws-5.11: DNE
1717+
1718+Patches_linux-aws-5.13:
1719+upstream_linux-aws-5.13: ignored (superseded by linux-aws-5.15)
1720+trusty_linux-aws-5.13: DNE
1721+xenial_linux-aws-5.13: DNE
1722+bionic_linux-aws-5.13: DNE
1723+focal_linux-aws-5.13: ignored (superseded by linux-aws-5.15)
1724+jammy_linux-aws-5.13: DNE
1725+kinetic_linux-aws-5.13: DNE
1726+
1727+Patches_linux-aws-5.15:
1728+upstream_linux-aws-5.15: needs-triage
1729+trusty_linux-aws-5.15: DNE
1730+xenial_linux-aws-5.15: DNE
1731+bionic_linux-aws-5.15: DNE
1732+focal_linux-aws-5.15: needs-triage
1733+jammy_linux-aws-5.15: DNE
1734+kinetic_linux-aws-5.15: DNE
1735+
1736+Patches_linux-aws-hwe:
1737+upstream_linux-aws-hwe: needs-triage
1738+esm-infra/xenial_linux-aws-hwe: needs-triage
1739+trusty_linux-aws-hwe: DNE
1740+xenial_linux-aws-hwe: ignored (end of standard support)
1741+bionic_linux-aws-hwe: DNE
1742+focal_linux-aws-hwe: DNE
1743+jammy_linux-aws-hwe: DNE
1744+kinetic_linux-aws-hwe: DNE
1745+
1746+Patches_linux-azure:
1747+upstream_linux-azure: needs-triage
1748+esm-infra/xenial_linux-azure: needs-triage
1749+trusty_linux-azure: ignored (out of standard support)
1750+xenial_linux-azure: ignored (end of standard support)
1751+bionic_linux-azure: ignored (superseded by linux-azure-5.3)
1752+focal_linux-azure: needs-triage
1753+jammy_linux-azure: needs-triage
1754+kinetic_linux-azure: needs-triage
1755+trusty/esm_linux-azure: needs-triage
1756+devel_linux-azure: needs-triage
1757+
1758+Patches_linux-azure-4.15:
1759+upstream_linux-azure-4.15: needs-triage
1760+trusty_linux-azure-4.15: DNE
1761+xenial_linux-azure-4.15: DNE
1762+bionic_linux-azure-4.15: needs-triage
1763+focal_linux-azure-4.15: DNE
1764+jammy_linux-azure-4.15: DNE
1765+kinetic_linux-azure-4.15: DNE
1766+
1767+Patches_linux-azure-5.3:
1768+upstream_linux-azure-5.3: ignored (superseded by linux-azure-5.4)
1769+trusty_linux-azure-5.3: DNE
1770+xenial_linux-azure-5.3: DNE
1771+bionic_linux-azure-5.3: ignored (superseded by linux-azure-5.4)
1772+focal_linux-azure-5.3: DNE
1773+jammy_linux-azure-5.3: DNE
1774+kinetic_linux-azure-5.3: DNE
1775+
1776+Patches_linux-azure-5.4:
1777+upstream_linux-azure-5.4: needs-triage
1778+trusty_linux-azure-5.4: DNE
1779+xenial_linux-azure-5.4: DNE
1780+bionic_linux-azure-5.4: needs-triage
1781+focal_linux-azure-5.4: DNE
1782+jammy_linux-azure-5.4: DNE
1783+kinetic_linux-azure-5.4: DNE
1784+
1785+Patches_linux-azure-5.8:
1786+upstream_linux-azure-5.8: ignored (superseded by linux-azure-5.11)
1787+trusty_linux-azure-5.8: DNE
1788+xenial_linux-azure-5.8: DNE
1789+bionic_linux-azure-5.8: DNE
1790+focal_linux-azure-5.8: ignored (superseded by linux-azure-5.11)
1791+jammy_linux-azure-5.8: DNE
1792+kinetic_linux-azure-5.8: DNE
1793+
1794+Patches_linux-azure-5.11:
1795+upstream_linux-azure-5.11: ignored (superseded by linux-azure-5.13)
1796+trusty_linux-azure-5.11: DNE
1797+xenial_linux-azure-5.11: DNE
1798+bionic_linux-azure-5.11: DNE
1799+focal_linux-azure-5.11: ignored (superseded by linux-azure-5.13)
1800+jammy_linux-azure-5.11: DNE
1801+kinetic_linux-azure-5.11: DNE
1802+
1803+Patches_linux-azure-5.13:
1804+upstream_linux-azure-5.13: ignored (superseded by linux-azure-5.15)
1805+trusty_linux-azure-5.13: DNE
1806+xenial_linux-azure-5.13: DNE
1807+bionic_linux-azure-5.13: DNE
1808+focal_linux-azure-5.13: ignored (superseded by linux-azure-5.15)
1809+jammy_linux-azure-5.13: DNE
1810+kinetic_linux-azure-5.13: DNE
1811+
1812+Patches_linux-azure-5.15:
1813+upstream_linux-azure-5.15: needs-triage
1814+trusty_linux-azure-5.15: DNE
1815+xenial_linux-azure-5.15: DNE
1816+bionic_linux-azure-5.15: DNE
1817+focal_linux-azure-5.15: needs-triage
1818+jammy_linux-azure-5.15: DNE
1819+kinetic_linux-azure-5.15: DNE
1820+
1821+Patches_linux-azure-fde:
1822+upstream_linux-azure-fde: needs-triage
1823+trusty_linux-azure-fde: DNE
1824+xenial_linux-azure-fde: DNE
1825+bionic_linux-azure-fde: DNE
1826+focal_linux-azure-fde: needs-triage
1827+jammy_linux-azure-fde: needs-triage
1828+kinetic_linux-azure-fde: DNE
1829+
1830+Patches_linux-azure-fde-5.15:
1831+upstream_linux-azure-fde-5.15: needs-triage
1832+trusty_linux-azure-fde-5.15: DNE
1833+xenial_linux-azure-fde-5.15: DNE
1834+bionic_linux-azure-fde-5.15: DNE
1835+focal_linux-azure-fde-5.15: needs-triage
1836+jammy_linux-azure-fde-5.15: DNE
1837+kinetic_linux-azure-fde-5.15: DNE
1838+
1839+Patches_linux-bluefield:
1840+upstream_linux-bluefield: needs-triage
1841+trusty_linux-bluefield: DNE
1842+xenial_linux-bluefield: DNE
1843+bionic_linux-bluefield: DNE
1844+focal_linux-bluefield: needs-triage
1845+jammy_linux-bluefield: DNE
1846+kinetic_linux-bluefield: DNE
1847+
1848+Patches_linux-dell300x:
1849+upstream_linux-dell300x: needs-triage
1850+trusty_linux-dell300x: DNE
1851+xenial_linux-dell300x: DNE
1852+bionic_linux-dell300x: needs-triage
1853+focal_linux-dell300x: DNE
1854+jammy_linux-dell300x: DNE
1855+kinetic_linux-dell300x: DNE
1856+
1857+Patches_linux-azure-edge:
1858+upstream_linux-azure-edge: needs-triage
1859+trusty_linux-azure-edge: DNE
1860+xenial_linux-azure-edge: DNE
1861+bionic_linux-azure-edge: ignored (superseded by linux-azure-5.3)
1862+focal_linux-azure-edge: DNE
1863+jammy_linux-azure-edge: DNE
1864+kinetic_linux-azure-edge: DNE
1865+
1866+Patches_linux-fips:
1867+upstream_linux-fips: needs-triage
1868+trusty_linux-fips: ignored (out of standard support)
1869+xenial_linux-fips: ignored (out of standard support)
1870+bionic_linux-fips: DNE
1871+focal_linux-fips: DNE
1872+jammy_linux-fips: DNE
1873+kinetic_linux-fips: DNE
1874+fips/xenial_linux-fips: needs-triage
1875+fips/bionic_linux-fips: needs-triage
1876+fips/focal_linux-fips: needs-triage
1877+fips-updates/xenial_linux-fips: needs-triage
1878+fips-updates/bionic_linux-fips: needs-triage
1879+fips-updates/focal_linux-fips: needs-triage
1880+
1881+Patches_linux-gcp:
1882+upstream_linux-gcp: needs-triage
1883+esm-infra/xenial_linux-gcp: needs-triage
1884+trusty_linux-gcp: DNE
1885+xenial_linux-gcp: ignored (end of standard support)
1886+bionic_linux-gcp: ignored (superseded by linux-gcp-5.3)
1887+focal_linux-gcp: needs-triage
1888+jammy_linux-gcp: needs-triage
1889+kinetic_linux-gcp: needs-triage
1890+devel_linux-gcp: needs-triage
1891+
1892+Patches_linux-gcp-4.15:
1893+upstream_linux-gcp-4.15: needs-triage
1894+trusty_linux-gcp-4.15: DNE
1895+xenial_linux-gcp-4.15: DNE
1896+bionic_linux-gcp-4.15: needs-triage
1897+focal_linux-gcp-4.15: DNE
1898+jammy_linux-gcp-4.15: DNE
1899+kinetic_linux-gcp-4.15: DNE
1900+
1901+Patches_linux-gcp-5.3:
1902+upstream_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4)
1903+trusty_linux-gcp-5.3: DNE
1904+xenial_linux-gcp-5.3: DNE
1905+bionic_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4)
1906+focal_linux-gcp-5.3: DNE
1907+jammy_linux-gcp-5.3: DNE
1908+kinetic_linux-gcp-5.3: DNE
1909+
1910+Patches_linux-gcp-5.4:
1911+upstream_linux-gcp-5.4: needs-triage
1912+trusty_linux-gcp-5.4: DNE
1913+xenial_linux-gcp-5.4: DNE
1914+bionic_linux-gcp-5.4: needs-triage
1915+focal_linux-gcp-5.4: DNE
1916+jammy_linux-gcp-5.4: DNE
1917+kinetic_linux-gcp-5.4: DNE
1918+
1919+Patches_linux-gcp-5.8:
1920+upstream_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11)
1921+trusty_linux-gcp-5.8: DNE
1922+xenial_linux-gcp-5.8: DNE
1923+bionic_linux-gcp-5.8: DNE
1924+focal_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11)
1925+jammy_linux-gcp-5.8: DNE
1926+kinetic_linux-gcp-5.8: DNE
1927+
1928+Patches_linux-gcp-5.11:
1929+upstream_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13)
1930+trusty_linux-gcp-5.11: DNE
1931+xenial_linux-gcp-5.11: DNE
1932+bionic_linux-gcp-5.11: DNE
1933+focal_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13)
1934+jammy_linux-gcp-5.11: DNE
1935+kinetic_linux-gcp-5.11: DNE
1936+
1937+Patches_linux-gcp-5.13:
1938+upstream_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15)
1939+trusty_linux-gcp-5.13: DNE
1940+xenial_linux-gcp-5.13: DNE
1941+bionic_linux-gcp-5.13: DNE
1942+focal_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15)
1943+jammy_linux-gcp-5.13: DNE
1944+kinetic_linux-gcp-5.13: DNE
1945+
1946+Patches_linux-gcp-5.15:
1947+upstream_linux-gcp-5.15: needs-triage
1948+trusty_linux-gcp-5.15: DNE
1949+xenial_linux-gcp-5.15: DNE
1950+bionic_linux-gcp-5.15: DNE
1951+focal_linux-gcp-5.15: needs-triage
1952+jammy_linux-gcp-5.15: DNE
1953+kinetic_linux-gcp-5.15: DNE
1954+
1955+Patches_linux-gke:
1956+upstream_linux-gke: needs-triage
1957+trusty_linux-gke: DNE
1958+xenial_linux-gke: ignored (reached end of standard support)
1959+bionic_linux-gke: DNE
1960+focal_linux-gke: needs-triage
1961+jammy_linux-gke: needs-triage
1962+kinetic_linux-gke: DNE
1963+
1964+Patches_linux-gke-4.15:
1965+upstream_linux-gke-4.15: needs-triage
1966+trusty_linux-gke-4.15: DNE
1967+xenial_linux-gke-4.15: DNE
1968+bionic_linux-gke-4.15: needs-triage
1969+focal_linux-gke-4.15: DNE
1970+jammy_linux-gke-4.15: DNE
1971+kinetic_linux-gke-4.15: DNE
1972+
1973+Patches_linux-gke-5.0:
1974+upstream_linux-gke-5.0: needs-triage
1975+trusty_linux-gke-5.0: DNE
1976+xenial_linux-gke-5.0: DNE
1977+bionic_linux-gke-5.0: ignored (superseded by linux-gke-5.3)
1978+focal_linux-gke-5.0: DNE
1979+jammy_linux-gke-5.0: DNE
1980+kinetic_linux-gke-5.0: DNE
1981+
1982+Patches_linux-gke-5.3:
1983+upstream_linux-gke-5.3: ignored (superseded by linux-gke-5.4)
1984+trusty_linux-gke-5.3: DNE
1985+xenial_linux-gke-5.3: DNE
1986+bionic_linux-gke-5.3: ignored (superseded by linux-gke-5.4)
1987+focal_linux-gke-5.3: DNE
1988+jammy_linux-gke-5.3: DNE
1989+kinetic_linux-gke-5.3: DNE
1990+
1991+Patches_linux-gke-5.4:
1992+upstream_linux-gke-5.4: needs-triage
1993+trusty_linux-gke-5.4: DNE
1994+xenial_linux-gke-5.4: DNE
1995+bionic_linux-gke-5.4: needs-triage
1996+focal_linux-gke-5.4: DNE
1997+jammy_linux-gke-5.4: DNE
1998+kinetic_linux-gke-5.4: DNE
1999+
2000+Patches_linux-gke-5.15:
2001+upstream_linux-gke-5.15: needs-triage
2002+trusty_linux-gke-5.15: DNE
2003+xenial_linux-gke-5.15: DNE
2004+bionic_linux-gke-5.15: DNE
2005+focal_linux-gke-5.15: needs-triage
2006+jammy_linux-gke-5.15: DNE
2007+kinetic_linux-gke-5.15: DNE
2008+
2009+Patches_linux-gkeop:
2010+upstream_linux-gkeop: needs-triage
2011+trusty_linux-gkeop: DNE
2012+xenial_linux-gkeop: DNE
2013+bionic_linux-gkeop: DNE
2014+focal_linux-gkeop: needs-triage
2015+jammy_linux-gkeop: needs-triage
2016+kinetic_linux-gkeop: DNE
2017+
2018+Patches_linux-gkeop-5.4:
2019+upstream_linux-gkeop-5.4: needs-triage
2020+trusty_linux-gkeop-5.4: DNE
2021+xenial_linux-gkeop-5.4: DNE
2022+bionic_linux-gkeop-5.4: needs-triage
2023+focal_linux-gkeop-5.4: DNE
2024+jammy_linux-gkeop-5.4: DNE
2025+kinetic_linux-gkeop-5.4: DNE
2026+
2027+Patches_linux-ibm:
2028+upstream_linux-ibm: needs-triage
2029+trusty_linux-ibm: DNE
2030+xenial_linux-ibm: DNE
2031+bionic_linux-ibm: DNE
2032+focal_linux-ibm: needs-triage
2033+jammy_linux-ibm: needs-triage
2034+kinetic_linux-ibm: needs-triage
2035+devel_linux-ibm: needs-triage
2036+
2037+Patches_linux-ibm-5.4:
2038+upstream_linux-ibm-5.4: needs-triage
2039+trusty_linux-ibm-5.4: DNE
2040+xenial_linux-ibm-5.4: DNE
2041+bionic_linux-ibm-5.4: needs-triage
2042+focal_linux-ibm-5.4: DNE
2043+jammy_linux-ibm-5.4: DNE
2044+kinetic_linux-ibm-5.4: DNE
2045+
2046+Patches_linux-intel-5.13:
2047+upstream_linux-intel-5.13: needs-triage
2048+trusty_linux-intel-5.13: DNE
2049+xenial_linux-intel-5.13: DNE
2050+bionic_linux-intel-5.13: DNE
2051+focal_linux-intel-5.13: needs-triage
2052+jammy_linux-intel-5.13: DNE
2053+kinetic_linux-intel-5.13: DNE
2054+
2055+Patches_linux-intel-iotg:
2056+upstream_linux-intel-iotg: needs-triage
2057+trusty_linux-intel-iotg: DNE
2058+xenial_linux-intel-iotg: DNE
2059+bionic_linux-intel-iotg: DNE
2060+focal_linux-intel-iotg: DNE
2061+jammy_linux-intel-iotg: needs-triage
2062+kinetic_linux-intel-iotg: DNE
2063+
2064+Patches_linux-intel-iotg-5.15:
2065+upstream_linux-intel-iotg-5.15: needs-triage
2066+trusty_linux-intel-iotg-5.15: DNE
2067+xenial_linux-intel-iotg-5.15: DNE
2068+bionic_linux-intel-iotg-5.15: DNE
2069+focal_linux-intel-iotg-5.15: needs-triage
2070+jammy_linux-intel-iotg-5.15: DNE
2071+kinetic_linux-intel-iotg-5.15: DNE
2072+
2073+Patches_linux-lowlatency:
2074+upstream_linux-lowlatency: needs-triage
2075+trusty_linux-lowlatency: DNE
2076+xenial_linux-lowlatency: DNE
2077+bionic_linux-lowlatency: DNE
2078+focal_linux-lowlatency: DNE
2079+jammy_linux-lowlatency: needs-triage
2080+kinetic_linux-lowlatency: needs-triage
2081+devel_linux-lowlatency: needs-triage
2082+
2083+Patches_linux-lowlatency-hwe-5.15:
2084+upstream_linux-lowlatency-hwe-5.15: needs-triage
2085+trusty_linux-lowlatency-hwe-5.15: DNE
2086+xenial_linux-lowlatency-hwe-5.15: DNE
2087+bionic_linux-lowlatency-hwe-5.15: DNE
2088+focal_linux-lowlatency-hwe-5.15: needs-triage
2089+jammy_linux-lowlatency-hwe-5.15: DNE
2090+kinetic_linux-lowlatency-hwe-5.15: DNE
2091+
2092+Patches_linux-oracle:
2093+upstream_linux-oracle: needs-triage
2094+esm-infra/xenial_linux-oracle: needs-triage
2095+trusty_linux-oracle: DNE
2096+xenial_linux-oracle: ignored (end of standard support)
2097+bionic_linux-oracle: needs-triage
2098+focal_linux-oracle: needs-triage
2099+jammy_linux-oracle: needs-triage
2100+kinetic_linux-oracle: needs-triage
2101+devel_linux-oracle: needs-triage
2102+
2103+Patches_linux-oracle-5.0:
2104+upstream_linux-oracle-5.0: needs-triage
2105+trusty_linux-oracle-5.0: DNE
2106+xenial_linux-oracle-5.0: DNE
2107+bionic_linux-oracle-5.0: ignored (superseded by linux-oracle-5.3)
2108+focal_linux-oracle-5.0: DNE
2109+jammy_linux-oracle-5.0: DNE
2110+kinetic_linux-oracle-5.0: DNE
2111+
2112+Patches_linux-oracle-5.3:
2113+upstream_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4)
2114+trusty_linux-oracle-5.3: DNE
2115+xenial_linux-oracle-5.3: DNE
2116+bionic_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4)
2117+focal_linux-oracle-5.3: DNE
2118+jammy_linux-oracle-5.3: DNE
2119+kinetic_linux-oracle-5.3: DNE
2120+
2121+Patches_linux-oracle-5.4:
2122+upstream_linux-oracle-5.4: needs-triage
2123+trusty_linux-oracle-5.4: DNE
2124+xenial_linux-oracle-5.4: DNE
2125+bionic_linux-oracle-5.4: needs-triage
2126+focal_linux-oracle-5.4: DNE
2127+jammy_linux-oracle-5.4: DNE
2128+kinetic_linux-oracle-5.4: DNE
2129+
2130+Patches_linux-oracle-5.8:
2131+upstream_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11)
2132+trusty_linux-oracle-5.8: DNE
2133+xenial_linux-oracle-5.8: DNE
2134+bionic_linux-oracle-5.8: DNE
2135+focal_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11)
2136+jammy_linux-oracle-5.8: DNE
2137+kinetic_linux-oracle-5.8: DNE
2138+
2139+Patches_linux-oracle-5.11:
2140+upstream_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13)
2141+trusty_linux-oracle-5.11: DNE
2142+xenial_linux-oracle-5.11: DNE
2143+bionic_linux-oracle-5.11: DNE
2144+focal_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13)
2145+jammy_linux-oracle-5.11: DNE
2146+kinetic_linux-oracle-5.11: DNE
2147+
2148+Patches_linux-oracle-5.13:
2149+upstream_linux-oracle-5.13: needs-triage
2150+trusty_linux-oracle-5.13: DNE
2151+xenial_linux-oracle-5.13: DNE
2152+bionic_linux-oracle-5.13: DNE
2153+focal_linux-oracle-5.13: needs-triage
2154+jammy_linux-oracle-5.13: DNE
2155+kinetic_linux-oracle-5.13: DNE
2156+
2157+Patches_linux-oracle-5.15:
2158+upstream_linux-oracle-5.15: needs-triage
2159+trusty_linux-oracle-5.15: DNE
2160+xenial_linux-oracle-5.15: DNE
2161+bionic_linux-oracle-5.15: DNE
2162+focal_linux-oracle-5.15: needs-triage
2163+jammy_linux-oracle-5.15: DNE
2164+kinetic_linux-oracle-5.15: DNE
2165+
2166+Patches_linux-oem:
2167+upstream_linux-oem: needs-triage
2168+trusty_linux-oem: DNE
2169+xenial_linux-oem: ignored (superseded by linux-hwe)
2170+bionic_linux-oem: needs-triage
2171+focal_linux-oem: DNE
2172+jammy_linux-oem: DNE
2173+kinetic_linux-oem: DNE
2174+
2175+Patches_linux-oem-5.6:
2176+upstream_linux-oem-5.6: needs-triage
2177+trusty_linux-oem-5.6: DNE
2178+xenial_linux-oem-5.6: DNE
2179+bionic_linux-oem-5.6: DNE
2180+focal_linux-oem-5.6: needs-triage
2181+jammy_linux-oem-5.6: DNE
2182+kinetic_linux-oem-5.6: DNE
2183+
2184+Patches_linux-oem-5.10:
2185+upstream_linux-oem-5.10: needs-triage
2186+trusty_linux-oem-5.10: DNE
2187+xenial_linux-oem-5.10: DNE
2188+bionic_linux-oem-5.10: DNE
2189+focal_linux-oem-5.10: needs-triage
2190+jammy_linux-oem-5.10: DNE
2191+kinetic_linux-oem-5.10: DNE
2192+
2193+Patches_linux-oem-5.13:
2194+upstream_linux-oem-5.13: ignored (superseded by linux-oem-5.14)
2195+trusty_linux-oem-5.13: DNE
2196+xenial_linux-oem-5.13: DNE
2197+bionic_linux-oem-5.13: DNE
2198+focal_linux-oem-5.13: ignored (superseded by linux-oem-5.14)
2199+jammy_linux-oem-5.13: DNE
2200+kinetic_linux-oem-5.13: DNE
2201+
2202+Patches_linux-oem-5.14:
2203+upstream_linux-oem-5.14: needs-triage
2204+trusty_linux-oem-5.14: DNE
2205+xenial_linux-oem-5.14: DNE
2206+bionic_linux-oem-5.14: DNE
2207+focal_linux-oem-5.14: needs-triage
2208+jammy_linux-oem-5.14: DNE
2209+kinetic_linux-oem-5.14: DNE
2210+
2211+Patches_linux-oem-5.17:
2212+upstream_linux-oem-5.17: needs-triage
2213+trusty_linux-oem-5.17: DNE
2214+xenial_linux-oem-5.17: DNE
2215+bionic_linux-oem-5.17: DNE
2216+focal_linux-oem-5.17: DNE
2217+jammy_linux-oem-5.17: needs-triage
2218+kinetic_linux-oem-5.17: needs-triage
2219+devel_linux-oem-5.17: needs-triage
2220+
2221+Patches_linux-oem-osp1:
2222+upstream_linux-oem-osp1: needs-triage
2223+trusty_linux-oem-osp1: DNE
2224+xenial_linux-oem-osp1: DNE
2225+bionic_linux-oem-osp1: needs-triage
2226+focal_linux-oem-osp1: DNE
2227+jammy_linux-oem-osp1: DNE
2228+kinetic_linux-oem-osp1: DNE
2229+
2230+Patches_linux-raspi:
2231+upstream_linux-raspi: needs-triage
2232+trusty_linux-raspi: DNE
2233+xenial_linux-raspi: DNE
2234+bionic_linux-raspi: DNE
2235+focal_linux-raspi: needs-triage
2236+jammy_linux-raspi: needs-triage
2237+kinetic_linux-raspi: needs-triage
2238+devel_linux-raspi: needs-triage
2239+
2240+Patches_linux-raspi2:
2241+upstream_linux-raspi2: needs-triage
2242+trusty_linux-raspi2: DNE
2243+xenial_linux-raspi2: ignored (end of standard support)
2244+bionic_linux-raspi2: needs-triage
2245+focal_linux-raspi2: ignored (replaced by linux-raspi)
2246+jammy_linux-raspi2: DNE
2247+kinetic_linux-raspi2: DNE
2248+
2249+Patches_linux-raspi2-5.3:
2250+upstream_linux-raspi2-5.3: ignored (superseded by linux-raspi2-5.4)
2251+trusty_linux-raspi2-5.3: DNE
2252+xenial_linux-raspi2-5.3: DNE
2253+bionic_linux-raspi2-5.3: ignored (superseded by linux-raspi-5.4)
2254+focal_linux-raspi2-5.3: DNE
2255+jammy_linux-raspi2-5.3: DNE
2256+kinetic_linux-raspi2-5.3: DNE
2257+
2258+Patches_linux-raspi-5.4:
2259+upstream_linux-raspi-5.4: needs-triage
2260+trusty_linux-raspi-5.4: DNE
2261+xenial_linux-raspi-5.4: DNE
2262+bionic_linux-raspi-5.4: needs-triage
2263+focal_linux-raspi-5.4: DNE
2264+jammy_linux-raspi-5.4: DNE
2265+kinetic_linux-raspi-5.4: DNE
2266+
2267+Patches_linux-riscv:
2268+upstream_linux-riscv: needs-triage
2269+trusty_linux-riscv: DNE
2270+xenial_linux-riscv: DNE
2271+bionic_linux-riscv: DNE
2272+focal_linux-riscv: ignored (superseded by linux-riscv-5.8)
2273+jammy_linux-riscv: needs-triage
2274+kinetic_linux-riscv: needs-triage
2275+devel_linux-riscv: needs-triage
2276+
2277+Patches_linux-riscv-5.8:
2278+upstream_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11)
2279+trusty_linux-riscv-5.8: DNE
2280+xenial_linux-riscv-5.8: DNE
2281+bionic_linux-riscv-5.8: DNE
2282+focal_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11)
2283+jammy_linux-riscv-5.8: DNE
2284+kinetic_linux-riscv-5.8: DNE
2285+
2286+Patches_linux-riscv-5.11:
2287+upstream_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13)
2288+trusty_linux-riscv-5.11: DNE
2289+xenial_linux-riscv-5.11: DNE
2290+bionic_linux-riscv-5.11: DNE
2291+focal_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13)
2292+jammy_linux-riscv-5.11: DNE
2293+kinetic_linux-riscv-5.11: DNE
2294+
2295+Patches_linux-snapdragon:
2296+upstream_linux-snapdragon: needs-triage
2297+trusty_linux-snapdragon: DNE
2298+xenial_linux-snapdragon: ignored (end of standard support)
2299+bionic_linux-snapdragon: needs-triage
2300+focal_linux-snapdragon: DNE
2301+jammy_linux-snapdragon: DNE
2302+kinetic_linux-snapdragon: DNE
2303diff --git a/active/CVE-2022-20568 b/active/CVE-2022-20568
2304new file mode 100644
2305index 0000000..e74b01d
2306--- /dev/null
2307+++ b/active/CVE-2022-20568
2308@@ -0,0 +1,759 @@
2309+Candidate: CVE-2022-20568
2310+PublicDate: 2022-12-06
2311+References:
2312+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20568
2313+ https://source.android.com/docs/security/bulletin/pixel/2022-12-01
2314+ https://android.googlesource.com/kernel/common/+/bc80ea8a4296c4d75f7e3e27b65718cae09f20f1
2315+ https://lore.kernel.org/io-uring/YoOJ%2FT4QRKC+fAZE@google.com/
2316+Description:
2317+ [Unknown description]
2318+Ubuntu-Description:
2319+Notes:
2320+ amurray| Appears to only affect the upstream stable 5.10 kernel
2321+Mitigation:
2322+Bugs:
2323+Priority: medium
2324+Discovered-by:
2325+Assigned-to:
2326+CVSS:
2327+
2328+Patches_linux:
2329+upstream_linux: released (5.14.6-1)
2330+esm-infra/xenial_linux: needs-triage
2331+trusty_linux: ignored (out of standard support)
2332+xenial_linux: ignored (out of standard support)
2333+bionic_linux: needs-triage
2334+focal_linux: needs-triage
2335+jammy_linux: not-affected (5.15.0-56.62)
2336+kinetic_linux: not-affected
2337+trusty/esm_linux: not-affected
2338+devel_linux: not-affected
2339+
2340+Patches_linux-hwe:
2341+upstream_linux-hwe: needs-triage
2342+esm-infra/xenial_linux-hwe: needs-triage
2343+trusty_linux-hwe: DNE
2344+xenial_linux-hwe: ignored (end of standard support)
2345+bionic_linux-hwe: ignored (replaced by linux-hwe-5.4)
2346+focal_linux-hwe: DNE
2347+jammy_linux-hwe: DNE
2348+kinetic_linux-hwe: DNE
2349+
2350+Patches_linux-hwe-5.4:
2351+upstream_linux-hwe-5.4: needs-triage
2352+trusty_linux-hwe-5.4: DNE
2353+xenial_linux-hwe-5.4: DNE
2354+bionic_linux-hwe-5.4: needs-triage
2355+focal_linux-hwe-5.4: DNE
2356+jammy_linux-hwe-5.4: DNE
2357+kinetic_linux-hwe-5.4: DNE
2358+
2359+Patches_linux-hwe-5.8:
2360+upstream_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11)
2361+trusty_linux-hwe-5.8: DNE
2362+xenial_linux-hwe-5.8: DNE
2363+bionic_linux-hwe-5.8: DNE
2364+focal_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11)
2365+jammy_linux-hwe-5.8: DNE
2366+kinetic_linux-hwe-5.8: DNE
2367+
2368+Patches_linux-hwe-5.11:
2369+upstream_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13)
2370+trusty_linux-hwe-5.11: DNE
2371+xenial_linux-hwe-5.11: DNE
2372+bionic_linux-hwe-5.11: DNE
2373+focal_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13)
2374+jammy_linux-hwe-5.11: DNE
2375+kinetic_linux-hwe-5.11: DNE
2376+
2377+Patches_linux-hwe-5.13:
2378+upstream_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15)
2379+trusty_linux-hwe-5.13: DNE
2380+xenial_linux-hwe-5.13: DNE
2381+bionic_linux-hwe-5.13: DNE
2382+focal_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15)
2383+jammy_linux-hwe-5.13: DNE
2384+kinetic_linux-hwe-5.13: DNE
2385+
2386+Patches_linux-hwe-5.15:
2387+upstream_linux-hwe-5.15: needs-triage
2388+trusty_linux-hwe-5.15: DNE
2389+xenial_linux-hwe-5.15: DNE
2390+bionic_linux-hwe-5.15: DNE
2391+focal_linux-hwe-5.15: needs-triage
2392+jammy_linux-hwe-5.15: DNE
2393+kinetic_linux-hwe-5.15: DNE
2394+
2395+Patches_linux-hwe-edge:
2396+upstream_linux-hwe-edge: needs-triage
2397+esm-infra/xenial_linux-hwe-edge: ignored (superseded by linux-hwe)
2398+trusty_linux-hwe-edge: DNE
2399+xenial_linux-hwe-edge: ignored (superseded by linux-hwe)
2400+bionic_linux-hwe-edge: ignored (superseded by linux-hwe-5.4)
2401+focal_linux-hwe-edge: DNE
2402+jammy_linux-hwe-edge: DNE
2403+kinetic_linux-hwe-edge: DNE
2404+
2405+Patches_linux-lts-xenial:
2406+upstream_linux-lts-xenial: needs-triage
2407+trusty_linux-lts-xenial: ignored (out of standard support)
2408+xenial_linux-lts-xenial: DNE
2409+bionic_linux-lts-xenial: DNE
2410+focal_linux-lts-xenial: DNE
2411+jammy_linux-lts-xenial: DNE
2412+kinetic_linux-lts-xenial: DNE
2413+trusty/esm_linux-lts-xenial: needs-triage
2414+
2415+Patches_linux-kvm:
2416+upstream_linux-kvm: needs-triage
2417+esm-infra/xenial_linux-kvm: needs-triage
2418+trusty_linux-kvm: DNE
2419+xenial_linux-kvm: ignored (end of standard support)
2420+bionic_linux-kvm: needs-triage
2421+focal_linux-kvm: needs-triage
2422+jammy_linux-kvm: needs-triage
2423+kinetic_linux-kvm: needs-triage
2424+devel_linux-kvm: needs-triage
2425+
2426+Patches_linux-aws:
2427+upstream_linux-aws: needs-triage
2428+esm-infra/xenial_linux-aws: needs-triage
2429+trusty_linux-aws: ignored (out of standard support)
2430+xenial_linux-aws: ignored (end of standard support)
2431+bionic_linux-aws: needs-triage
2432+focal_linux-aws: needs-triage
2433+jammy_linux-aws: needs-triage
2434+kinetic_linux-aws: needs-triage
2435+trusty/esm_linux-aws: needs-triage
2436+devel_linux-aws: needs-triage
2437+
2438+Patches_linux-aws-5.0:
2439+upstream_linux-aws-5.0: needs-triage
2440+trusty_linux-aws-5.0: DNE
2441+xenial_linux-aws-5.0: DNE
2442+bionic_linux-aws-5.0: ignored (superseded by linux-aws-5.3)
2443+focal_linux-aws-5.0: DNE
2444+jammy_linux-aws-5.0: DNE
2445+kinetic_linux-aws-5.0: DNE
2446+
2447+Patches_linux-aws-5.3:
2448+upstream_linux-aws-5.3: ignored (superseded by linux-aws-5.4)
2449+trusty_linux-aws-5.3: DNE
2450+xenial_linux-aws-5.3: DNE
2451+bionic_linux-aws-5.3: ignored (superseded by linux-aws-5.4)
2452+focal_linux-aws-5.3: DNE
2453+jammy_linux-aws-5.3: DNE
2454+kinetic_linux-aws-5.3: DNE
2455+
2456+Patches_linux-aws-5.4:
2457+upstream_linux-aws-5.4: needs-triage
2458+trusty_linux-aws-5.4: DNE
2459+xenial_linux-aws-5.4: DNE
2460+bionic_linux-aws-5.4: needs-triage
2461+focal_linux-aws-5.4: DNE
2462+jammy_linux-aws-5.4: DNE
2463+kinetic_linux-aws-5.4: DNE
2464+
2465+Patches_linux-aws-5.8:
2466+upstream_linux-aws-5.8: ignored (superseded by linux-aws-5.11)
2467+trusty_linux-aws-5.8: DNE
2468+xenial_linux-aws-5.8: DNE
2469+bionic_linux-aws-5.8: DNE
2470+focal_linux-aws-5.8: ignored (superseded by linux-aws-5.11)
2471+jammy_linux-aws-5.8: DNE
2472+kinetic_linux-aws-5.8: DNE
2473+
2474+Patches_linux-aws-5.11:
2475+upstream_linux-aws-5.11: ignored (superseded by linux-aws-5.13)
2476+trusty_linux-aws-5.11: DNE
2477+xenial_linux-aws-5.11: DNE
2478+bionic_linux-aws-5.11: DNE
2479+focal_linux-aws-5.11: ignored (superseded by linux-aws-5.13)
2480+jammy_linux-aws-5.11: DNE
2481+kinetic_linux-aws-5.11: DNE
2482+
2483+Patches_linux-aws-5.13:
2484+upstream_linux-aws-5.13: ignored (superseded by linux-aws-5.15)
2485+trusty_linux-aws-5.13: DNE
2486+xenial_linux-aws-5.13: DNE
2487+bionic_linux-aws-5.13: DNE
2488+focal_linux-aws-5.13: ignored (superseded by linux-aws-5.15)
2489+jammy_linux-aws-5.13: DNE
2490+kinetic_linux-aws-5.13: DNE
2491+
2492+Patches_linux-aws-5.15:
2493+upstream_linux-aws-5.15: needs-triage
2494+trusty_linux-aws-5.15: DNE
2495+xenial_linux-aws-5.15: DNE
2496+bionic_linux-aws-5.15: DNE
2497+focal_linux-aws-5.15: needs-triage
2498+jammy_linux-aws-5.15: DNE
2499+kinetic_linux-aws-5.15: DNE
2500+
2501+Patches_linux-aws-hwe:
2502+upstream_linux-aws-hwe: needs-triage
2503+esm-infra/xenial_linux-aws-hwe: needs-triage
2504+trusty_linux-aws-hwe: DNE
2505+xenial_linux-aws-hwe: ignored (end of standard support)
2506+bionic_linux-aws-hwe: DNE
2507+focal_linux-aws-hwe: DNE
2508+jammy_linux-aws-hwe: DNE
2509+kinetic_linux-aws-hwe: DNE
2510+
2511+Patches_linux-azure:
2512+upstream_linux-azure: needs-triage
2513+esm-infra/xenial_linux-azure: needs-triage
2514+trusty_linux-azure: ignored (out of standard support)
2515+xenial_linux-azure: ignored (end of standard support)
2516+bionic_linux-azure: ignored (superseded by linux-azure-5.3)
2517+focal_linux-azure: needs-triage
2518+jammy_linux-azure: needs-triage
2519+kinetic_linux-azure: needs-triage
2520+trusty/esm_linux-azure: needs-triage
2521+devel_linux-azure: needs-triage
2522+
2523+Patches_linux-azure-4.15:
2524+upstream_linux-azure-4.15: needs-triage
2525+trusty_linux-azure-4.15: DNE
2526+xenial_linux-azure-4.15: DNE
2527+bionic_linux-azure-4.15: needs-triage
2528+focal_linux-azure-4.15: DNE
2529+jammy_linux-azure-4.15: DNE
2530+kinetic_linux-azure-4.15: DNE
2531+
2532+Patches_linux-azure-5.3:
2533+upstream_linux-azure-5.3: ignored (superseded by linux-azure-5.4)
2534+trusty_linux-azure-5.3: DNE
2535+xenial_linux-azure-5.3: DNE
2536+bionic_linux-azure-5.3: ignored (superseded by linux-azure-5.4)
2537+focal_linux-azure-5.3: DNE
2538+jammy_linux-azure-5.3: DNE
2539+kinetic_linux-azure-5.3: DNE
2540+
2541+Patches_linux-azure-5.4:
2542+upstream_linux-azure-5.4: needs-triage
2543+trusty_linux-azure-5.4: DNE
2544+xenial_linux-azure-5.4: DNE
2545+bionic_linux-azure-5.4: needs-triage
2546+focal_linux-azure-5.4: DNE
2547+jammy_linux-azure-5.4: DNE
2548+kinetic_linux-azure-5.4: DNE
2549+
2550+Patches_linux-azure-5.8:
2551+upstream_linux-azure-5.8: ignored (superseded by linux-azure-5.11)
2552+trusty_linux-azure-5.8: DNE
2553+xenial_linux-azure-5.8: DNE
2554+bionic_linux-azure-5.8: DNE
2555+focal_linux-azure-5.8: ignored (superseded by linux-azure-5.11)
2556+jammy_linux-azure-5.8: DNE
2557+kinetic_linux-azure-5.8: DNE
2558+
2559+Patches_linux-azure-5.11:
2560+upstream_linux-azure-5.11: ignored (superseded by linux-azure-5.13)
2561+trusty_linux-azure-5.11: DNE
2562+xenial_linux-azure-5.11: DNE
2563+bionic_linux-azure-5.11: DNE
2564+focal_linux-azure-5.11: ignored (superseded by linux-azure-5.13)
2565+jammy_linux-azure-5.11: DNE
2566+kinetic_linux-azure-5.11: DNE
2567+
2568+Patches_linux-azure-5.13:
2569+upstream_linux-azure-5.13: ignored (superseded by linux-azure-5.15)
2570+trusty_linux-azure-5.13: DNE
2571+xenial_linux-azure-5.13: DNE
2572+bionic_linux-azure-5.13: DNE
2573+focal_linux-azure-5.13: ignored (superseded by linux-azure-5.15)
2574+jammy_linux-azure-5.13: DNE
2575+kinetic_linux-azure-5.13: DNE
2576+
2577+Patches_linux-azure-5.15:
2578+upstream_linux-azure-5.15: needs-triage
2579+trusty_linux-azure-5.15: DNE
2580+xenial_linux-azure-5.15: DNE
2581+bionic_linux-azure-5.15: DNE
2582+focal_linux-azure-5.15: needs-triage
2583+jammy_linux-azure-5.15: DNE
2584+kinetic_linux-azure-5.15: DNE
2585+
2586+Patches_linux-azure-fde:
2587+upstream_linux-azure-fde: needs-triage
2588+trusty_linux-azure-fde: DNE
2589+xenial_linux-azure-fde: DNE
2590+bionic_linux-azure-fde: DNE
2591+focal_linux-azure-fde: needs-triage
2592+jammy_linux-azure-fde: needs-triage
2593+kinetic_linux-azure-fde: DNE
2594+
2595+Patches_linux-azure-fde-5.15:
2596+upstream_linux-azure-fde-5.15: needs-triage
2597+trusty_linux-azure-fde-5.15: DNE
2598+xenial_linux-azure-fde-5.15: DNE
2599+bionic_linux-azure-fde-5.15: DNE
2600+focal_linux-azure-fde-5.15: needs-triage
2601+jammy_linux-azure-fde-5.15: DNE
2602+kinetic_linux-azure-fde-5.15: DNE
2603+
2604+Patches_linux-bluefield:
2605+upstream_linux-bluefield: needs-triage
2606+trusty_linux-bluefield: DNE
2607+xenial_linux-bluefield: DNE
2608+bionic_linux-bluefield: DNE
2609+focal_linux-bluefield: needs-triage
2610+jammy_linux-bluefield: DNE
2611+kinetic_linux-bluefield: DNE
2612+
2613+Patches_linux-dell300x:
2614+upstream_linux-dell300x: needs-triage
2615+trusty_linux-dell300x: DNE
2616+xenial_linux-dell300x: DNE
2617+bionic_linux-dell300x: needs-triage
2618+focal_linux-dell300x: DNE
2619+jammy_linux-dell300x: DNE
2620+kinetic_linux-dell300x: DNE
2621+
2622+Patches_linux-azure-edge:
2623+upstream_linux-azure-edge: needs-triage
2624+trusty_linux-azure-edge: DNE
2625+xenial_linux-azure-edge: DNE
2626+bionic_linux-azure-edge: ignored (superseded by linux-azure-5.3)
2627+focal_linux-azure-edge: DNE
2628+jammy_linux-azure-edge: DNE
2629+kinetic_linux-azure-edge: DNE
2630+
2631+Patches_linux-fips:
2632+upstream_linux-fips: needs-triage
2633+trusty_linux-fips: ignored (out of standard support)
2634+xenial_linux-fips: ignored (out of standard support)
2635+bionic_linux-fips: DNE
2636+focal_linux-fips: DNE
2637+jammy_linux-fips: DNE
2638+kinetic_linux-fips: DNE
2639+fips/xenial_linux-fips: needs-triage
2640+fips/bionic_linux-fips: needs-triage
2641+fips/focal_linux-fips: needs-triage
2642+fips-updates/xenial_linux-fips: needs-triage
2643+fips-updates/bionic_linux-fips: needs-triage
2644+fips-updates/focal_linux-fips: needs-triage
2645+
2646+Patches_linux-gcp:
2647+upstream_linux-gcp: needs-triage
2648+esm-infra/xenial_linux-gcp: needs-triage
2649+trusty_linux-gcp: DNE
2650+xenial_linux-gcp: ignored (end of standard support)
2651+bionic_linux-gcp: ignored (superseded by linux-gcp-5.3)
2652+focal_linux-gcp: needs-triage
2653+jammy_linux-gcp: needs-triage
2654+kinetic_linux-gcp: needs-triage
2655+devel_linux-gcp: needs-triage
2656+
2657+Patches_linux-gcp-4.15:
2658+upstream_linux-gcp-4.15: needs-triage
2659+trusty_linux-gcp-4.15: DNE
2660+xenial_linux-gcp-4.15: DNE
2661+bionic_linux-gcp-4.15: needs-triage
2662+focal_linux-gcp-4.15: DNE
2663+jammy_linux-gcp-4.15: DNE
2664+kinetic_linux-gcp-4.15: DNE
2665+
2666+Patches_linux-gcp-5.3:
2667+upstream_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4)
2668+trusty_linux-gcp-5.3: DNE
2669+xenial_linux-gcp-5.3: DNE
2670+bionic_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4)
2671+focal_linux-gcp-5.3: DNE
2672+jammy_linux-gcp-5.3: DNE
2673+kinetic_linux-gcp-5.3: DNE
2674+
2675+Patches_linux-gcp-5.4:
2676+upstream_linux-gcp-5.4: needs-triage
2677+trusty_linux-gcp-5.4: DNE
2678+xenial_linux-gcp-5.4: DNE
2679+bionic_linux-gcp-5.4: needs-triage
2680+focal_linux-gcp-5.4: DNE
2681+jammy_linux-gcp-5.4: DNE
2682+kinetic_linux-gcp-5.4: DNE
2683+
2684+Patches_linux-gcp-5.8:
2685+upstream_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11)
2686+trusty_linux-gcp-5.8: DNE
2687+xenial_linux-gcp-5.8: DNE
2688+bionic_linux-gcp-5.8: DNE
2689+focal_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11)
2690+jammy_linux-gcp-5.8: DNE
2691+kinetic_linux-gcp-5.8: DNE
2692+
2693+Patches_linux-gcp-5.11:
2694+upstream_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13)
2695+trusty_linux-gcp-5.11: DNE
2696+xenial_linux-gcp-5.11: DNE
2697+bionic_linux-gcp-5.11: DNE
2698+focal_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13)
2699+jammy_linux-gcp-5.11: DNE
2700+kinetic_linux-gcp-5.11: DNE
2701+
2702+Patches_linux-gcp-5.13:
2703+upstream_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15)
2704+trusty_linux-gcp-5.13: DNE
2705+xenial_linux-gcp-5.13: DNE
2706+bionic_linux-gcp-5.13: DNE
2707+focal_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15)
2708+jammy_linux-gcp-5.13: DNE
2709+kinetic_linux-gcp-5.13: DNE
2710+
2711+Patches_linux-gcp-5.15:
2712+upstream_linux-gcp-5.15: needs-triage
2713+trusty_linux-gcp-5.15: DNE
2714+xenial_linux-gcp-5.15: DNE
2715+bionic_linux-gcp-5.15: DNE
2716+focal_linux-gcp-5.15: needs-triage
2717+jammy_linux-gcp-5.15: DNE
2718+kinetic_linux-gcp-5.15: DNE
2719+
2720+Patches_linux-gke:
2721+upstream_linux-gke: needs-triage
2722+trusty_linux-gke: DNE
2723+xenial_linux-gke: ignored (reached end of standard support)
2724+bionic_linux-gke: DNE
2725+focal_linux-gke: needs-triage
2726+jammy_linux-gke: needs-triage
2727+kinetic_linux-gke: DNE
2728+
2729+Patches_linux-gke-4.15:
2730+upstream_linux-gke-4.15: needs-triage
2731+trusty_linux-gke-4.15: DNE
2732+xenial_linux-gke-4.15: DNE
2733+bionic_linux-gke-4.15: needs-triage
2734+focal_linux-gke-4.15: DNE
2735+jammy_linux-gke-4.15: DNE
2736+kinetic_linux-gke-4.15: DNE
2737+
2738+Patches_linux-gke-5.0:
2739+upstream_linux-gke-5.0: needs-triage
2740+trusty_linux-gke-5.0: DNE
2741+xenial_linux-gke-5.0: DNE
2742+bionic_linux-gke-5.0: ignored (superseded by linux-gke-5.3)
2743+focal_linux-gke-5.0: DNE
2744+jammy_linux-gke-5.0: DNE
2745+kinetic_linux-gke-5.0: DNE
2746+
2747+Patches_linux-gke-5.3:
2748+upstream_linux-gke-5.3: ignored (superseded by linux-gke-5.4)
2749+trusty_linux-gke-5.3: DNE
2750+xenial_linux-gke-5.3: DNE
2751+bionic_linux-gke-5.3: ignored (superseded by linux-gke-5.4)
2752+focal_linux-gke-5.3: DNE
2753+jammy_linux-gke-5.3: DNE
2754+kinetic_linux-gke-5.3: DNE
2755+
2756+Patches_linux-gke-5.4:
2757+upstream_linux-gke-5.4: needs-triage
2758+trusty_linux-gke-5.4: DNE
2759+xenial_linux-gke-5.4: DNE
2760+bionic_linux-gke-5.4: needs-triage
2761+focal_linux-gke-5.4: DNE
2762+jammy_linux-gke-5.4: DNE
2763+kinetic_linux-gke-5.4: DNE
2764+
2765+Patches_linux-gke-5.15:
2766+upstream_linux-gke-5.15: needs-triage
2767+trusty_linux-gke-5.15: DNE
2768+xenial_linux-gke-5.15: DNE
2769+bionic_linux-gke-5.15: DNE
2770+focal_linux-gke-5.15: needs-triage
2771+jammy_linux-gke-5.15: DNE
2772+kinetic_linux-gke-5.15: DNE
2773+
2774+Patches_linux-gkeop:
2775+upstream_linux-gkeop: needs-triage
2776+trusty_linux-gkeop: DNE
2777+xenial_linux-gkeop: DNE
2778+bionic_linux-gkeop: DNE
2779+focal_linux-gkeop: needs-triage
2780+jammy_linux-gkeop: needs-triage
2781+kinetic_linux-gkeop: DNE
2782+
2783+Patches_linux-gkeop-5.4:
2784+upstream_linux-gkeop-5.4: needs-triage
2785+trusty_linux-gkeop-5.4: DNE
2786+xenial_linux-gkeop-5.4: DNE
2787+bionic_linux-gkeop-5.4: needs-triage
2788+focal_linux-gkeop-5.4: DNE
2789+jammy_linux-gkeop-5.4: DNE
2790+kinetic_linux-gkeop-5.4: DNE
2791+
2792+Patches_linux-ibm:
2793+upstream_linux-ibm: needs-triage
2794+trusty_linux-ibm: DNE
2795+xenial_linux-ibm: DNE
2796+bionic_linux-ibm: DNE
2797+focal_linux-ibm: needs-triage
2798+jammy_linux-ibm: needs-triage
2799+kinetic_linux-ibm: needs-triage
2800+devel_linux-ibm: needs-triage
2801+
2802+Patches_linux-ibm-5.4:
2803+upstream_linux-ibm-5.4: needs-triage
2804+trusty_linux-ibm-5.4: DNE
2805+xenial_linux-ibm-5.4: DNE
2806+bionic_linux-ibm-5.4: needs-triage
2807+focal_linux-ibm-5.4: DNE
2808+jammy_linux-ibm-5.4: DNE
2809+kinetic_linux-ibm-5.4: DNE
2810+
2811+Patches_linux-intel-5.13:
2812+upstream_linux-intel-5.13: needs-triage
2813+trusty_linux-intel-5.13: DNE
2814+xenial_linux-intel-5.13: DNE
2815+bionic_linux-intel-5.13: DNE
2816+focal_linux-intel-5.13: needs-triage
2817+jammy_linux-intel-5.13: DNE
2818+kinetic_linux-intel-5.13: DNE
2819+
2820+Patches_linux-intel-iotg:
2821+upstream_linux-intel-iotg: needs-triage
2822+trusty_linux-intel-iotg: DNE
2823+xenial_linux-intel-iotg: DNE
2824+bionic_linux-intel-iotg: DNE
2825+focal_linux-intel-iotg: DNE
2826+jammy_linux-intel-iotg: needs-triage
2827+kinetic_linux-intel-iotg: DNE
2828+
2829+Patches_linux-intel-iotg-5.15:
2830+upstream_linux-intel-iotg-5.15: needs-triage
2831+trusty_linux-intel-iotg-5.15: DNE
2832+xenial_linux-intel-iotg-5.15: DNE
2833+bionic_linux-intel-iotg-5.15: DNE
2834+focal_linux-intel-iotg-5.15: needs-triage
2835+jammy_linux-intel-iotg-5.15: DNE
2836+kinetic_linux-intel-iotg-5.15: DNE
2837+
2838+Patches_linux-lowlatency:
2839+upstream_linux-lowlatency: needs-triage
2840+trusty_linux-lowlatency: DNE
2841+xenial_linux-lowlatency: DNE
2842+bionic_linux-lowlatency: DNE
2843+focal_linux-lowlatency: DNE
2844+jammy_linux-lowlatency: needs-triage
2845+kinetic_linux-lowlatency: needs-triage
2846+devel_linux-lowlatency: needs-triage
2847+
2848+Patches_linux-lowlatency-hwe-5.15:
2849+upstream_linux-lowlatency-hwe-5.15: needs-triage
2850+trusty_linux-lowlatency-hwe-5.15: DNE
2851+xenial_linux-lowlatency-hwe-5.15: DNE
2852+bionic_linux-lowlatency-hwe-5.15: DNE
2853+focal_linux-lowlatency-hwe-5.15: needs-triage
2854+jammy_linux-lowlatency-hwe-5.15: DNE
2855+kinetic_linux-lowlatency-hwe-5.15: DNE
2856+
2857+Patches_linux-oracle:
2858+upstream_linux-oracle: needs-triage
2859+esm-infra/xenial_linux-oracle: needs-triage
2860+trusty_linux-oracle: DNE
2861+xenial_linux-oracle: ignored (end of standard support)
2862+bionic_linux-oracle: needs-triage
2863+focal_linux-oracle: needs-triage
2864+jammy_linux-oracle: needs-triage
2865+kinetic_linux-oracle: needs-triage
2866+devel_linux-oracle: needs-triage
2867+
2868+Patches_linux-oracle-5.0:
2869+upstream_linux-oracle-5.0: needs-triage
2870+trusty_linux-oracle-5.0: DNE
2871+xenial_linux-oracle-5.0: DNE
2872+bionic_linux-oracle-5.0: ignored (superseded by linux-oracle-5.3)
2873+focal_linux-oracle-5.0: DNE
2874+jammy_linux-oracle-5.0: DNE
2875+kinetic_linux-oracle-5.0: DNE
2876+
2877+Patches_linux-oracle-5.3:
2878+upstream_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4)
2879+trusty_linux-oracle-5.3: DNE
2880+xenial_linux-oracle-5.3: DNE
2881+bionic_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4)
2882+focal_linux-oracle-5.3: DNE
2883+jammy_linux-oracle-5.3: DNE
2884+kinetic_linux-oracle-5.3: DNE
2885+
2886+Patches_linux-oracle-5.4:
2887+upstream_linux-oracle-5.4: needs-triage
2888+trusty_linux-oracle-5.4: DNE
2889+xenial_linux-oracle-5.4: DNE
2890+bionic_linux-oracle-5.4: needs-triage
2891+focal_linux-oracle-5.4: DNE
2892+jammy_linux-oracle-5.4: DNE
2893+kinetic_linux-oracle-5.4: DNE
2894+
2895+Patches_linux-oracle-5.8:
2896+upstream_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11)
2897+trusty_linux-oracle-5.8: DNE
2898+xenial_linux-oracle-5.8: DNE
2899+bionic_linux-oracle-5.8: DNE
2900+focal_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11)
2901+jammy_linux-oracle-5.8: DNE
2902+kinetic_linux-oracle-5.8: DNE
2903+
2904+Patches_linux-oracle-5.11:
2905+upstream_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13)
2906+trusty_linux-oracle-5.11: DNE
2907+xenial_linux-oracle-5.11: DNE
2908+bionic_linux-oracle-5.11: DNE
2909+focal_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13)
2910+jammy_linux-oracle-5.11: DNE
2911+kinetic_linux-oracle-5.11: DNE
2912+
2913+Patches_linux-oracle-5.13:
2914+upstream_linux-oracle-5.13: needs-triage
2915+trusty_linux-oracle-5.13: DNE
2916+xenial_linux-oracle-5.13: DNE
2917+bionic_linux-oracle-5.13: DNE
2918+focal_linux-oracle-5.13: needs-triage
2919+jammy_linux-oracle-5.13: DNE
2920+kinetic_linux-oracle-5.13: DNE
2921+
2922+Patches_linux-oracle-5.15:
2923+upstream_linux-oracle-5.15: needs-triage
2924+trusty_linux-oracle-5.15: DNE
2925+xenial_linux-oracle-5.15: DNE
2926+bionic_linux-oracle-5.15: DNE
2927+focal_linux-oracle-5.15: needs-triage
2928+jammy_linux-oracle-5.15: DNE
2929+kinetic_linux-oracle-5.15: DNE
2930+
2931+Patches_linux-oem:
2932+upstream_linux-oem: needs-triage
2933+trusty_linux-oem: DNE
2934+xenial_linux-oem: ignored (superseded by linux-hwe)
2935+bionic_linux-oem: needs-triage
2936+focal_linux-oem: DNE
2937+jammy_linux-oem: DNE
2938+kinetic_linux-oem: DNE
2939+
2940+Patches_linux-oem-5.6:
2941+upstream_linux-oem-5.6: needs-triage
2942+trusty_linux-oem-5.6: DNE
2943+xenial_linux-oem-5.6: DNE
2944+bionic_linux-oem-5.6: DNE
2945+focal_linux-oem-5.6: needs-triage
2946+jammy_linux-oem-5.6: DNE
2947+kinetic_linux-oem-5.6: DNE
2948+
2949+Patches_linux-oem-5.10:
2950+upstream_linux-oem-5.10: needs-triage
2951+trusty_linux-oem-5.10: DNE
2952+xenial_linux-oem-5.10: DNE
2953+bionic_linux-oem-5.10: DNE
2954+focal_linux-oem-5.10: needs-triage
2955+jammy_linux-oem-5.10: DNE
2956+kinetic_linux-oem-5.10: DNE
2957+
2958+Patches_linux-oem-5.13:
2959+upstream_linux-oem-5.13: ignored (superseded by linux-oem-5.14)
2960+trusty_linux-oem-5.13: DNE
2961+xenial_linux-oem-5.13: DNE
2962+bionic_linux-oem-5.13: DNE
2963+focal_linux-oem-5.13: ignored (superseded by linux-oem-5.14)
2964+jammy_linux-oem-5.13: DNE
2965+kinetic_linux-oem-5.13: DNE
2966+
2967+Patches_linux-oem-5.14:
2968+upstream_linux-oem-5.14: needs-triage
2969+trusty_linux-oem-5.14: DNE
2970+xenial_linux-oem-5.14: DNE
2971+bionic_linux-oem-5.14: DNE
2972+focal_linux-oem-5.14: needs-triage
2973+jammy_linux-oem-5.14: DNE
2974+kinetic_linux-oem-5.14: DNE
2975+
2976+Patches_linux-oem-5.17:
2977+upstream_linux-oem-5.17: needs-triage
2978+trusty_linux-oem-5.17: DNE
2979+xenial_linux-oem-5.17: DNE
2980+bionic_linux-oem-5.17: DNE
2981+focal_linux-oem-5.17: DNE
2982+jammy_linux-oem-5.17: needs-triage
2983+kinetic_linux-oem-5.17: needs-triage
2984+devel_linux-oem-5.17: needs-triage
2985+
2986+Patches_linux-oem-osp1:
2987+upstream_linux-oem-osp1: needs-triage
2988+trusty_linux-oem-osp1: DNE
2989+xenial_linux-oem-osp1: DNE
2990+bionic_linux-oem-osp1: needs-triage
2991+focal_linux-oem-osp1: DNE
2992+jammy_linux-oem-osp1: DNE
2993+kinetic_linux-oem-osp1: DNE
2994+
2995+Patches_linux-raspi:
2996+upstream_linux-raspi: needs-triage
2997+trusty_linux-raspi: DNE
2998+xenial_linux-raspi: DNE
2999+bionic_linux-raspi: DNE
3000+focal_linux-raspi: needs-triage
3001+jammy_linux-raspi: needs-triage
3002+kinetic_linux-raspi: needs-triage
3003+devel_linux-raspi: needs-triage
3004+
3005+Patches_linux-raspi2:
3006+upstream_linux-raspi2: needs-triage
3007+trusty_linux-raspi2: DNE
3008+xenial_linux-raspi2: ignored (end of standard support)
3009+bionic_linux-raspi2: needs-triage
3010+focal_linux-raspi2: ignored (replaced by linux-raspi)
3011+jammy_linux-raspi2: DNE
3012+kinetic_linux-raspi2: DNE
3013+
3014+Patches_linux-raspi2-5.3:
3015+upstream_linux-raspi2-5.3: ignored (superseded by linux-raspi2-5.4)
3016+trusty_linux-raspi2-5.3: DNE
3017+xenial_linux-raspi2-5.3: DNE
3018+bionic_linux-raspi2-5.3: ignored (superseded by linux-raspi-5.4)
3019+focal_linux-raspi2-5.3: DNE
3020+jammy_linux-raspi2-5.3: DNE
3021+kinetic_linux-raspi2-5.3: DNE
3022+
3023+Patches_linux-raspi-5.4:
3024+upstream_linux-raspi-5.4: needs-triage
3025+trusty_linux-raspi-5.4: DNE
3026+xenial_linux-raspi-5.4: DNE
3027+bionic_linux-raspi-5.4: needs-triage
3028+focal_linux-raspi-5.4: DNE
3029+jammy_linux-raspi-5.4: DNE
3030+kinetic_linux-raspi-5.4: DNE
3031+
3032+Patches_linux-riscv:
3033+upstream_linux-riscv: needs-triage
3034+trusty_linux-riscv: DNE
3035+xenial_linux-riscv: DNE
3036+bionic_linux-riscv: DNE
3037+focal_linux-riscv: ignored (superseded by linux-riscv-5.8)
3038+jammy_linux-riscv: needs-triage
3039+kinetic_linux-riscv: needs-triage
3040+devel_linux-riscv: needs-triage
3041+
3042+Patches_linux-riscv-5.8:
3043+upstream_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11)
3044+trusty_linux-riscv-5.8: DNE
3045+xenial_linux-riscv-5.8: DNE
3046+bionic_linux-riscv-5.8: DNE
3047+focal_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11)
3048+jammy_linux-riscv-5.8: DNE
3049+kinetic_linux-riscv-5.8: DNE
3050+
3051+Patches_linux-riscv-5.11:
3052+upstream_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13)
3053+trusty_linux-riscv-5.11: DNE
3054+xenial_linux-riscv-5.11: DNE
3055+bionic_linux-riscv-5.11: DNE
3056+focal_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13)
3057+jammy_linux-riscv-5.11: DNE
3058+kinetic_linux-riscv-5.11: DNE
3059+
3060+Patches_linux-snapdragon:
3061+upstream_linux-snapdragon: needs-triage
3062+trusty_linux-snapdragon: DNE
3063+xenial_linux-snapdragon: ignored (end of standard support)
3064+bionic_linux-snapdragon: needs-triage
3065+focal_linux-snapdragon: DNE
3066+jammy_linux-snapdragon: DNE
3067+kinetic_linux-snapdragon: DNE
3068diff --git a/active/CVE-2022-23467 b/active/CVE-2022-23467
3069new file mode 100644
3070index 0000000..d5b7d96
3071--- /dev/null
3072+++ b/active/CVE-2022-23467
3073@@ -0,0 +1,33 @@
3074+Candidate: CVE-2022-23467
3075+PublicDate: 2022-12-06
3076+References:
3077+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23467
3078+ https://github.com/openrazer/openrazer/security/advisories/GHSA-39hg-jvc9-fg7h
3079+ https://github.com/openrazer/openrazer/commit/33aa7f07d54ae066f201c6d298cb4a2181cb90e6
3080+Description:
3081+ OpenRazer is an open source driver and user-space daemon to control Razer
3082+ device lighting and other features on GNU/Linux. Using a modified USB
3083+ device an attacker can leak stack addresses of the
3084+ `razer_attr_read_dpi_stages`, potentially bypassing KASLR. To exploit this
3085+ vulnerability an attacker would need to access to a users keyboard or mouse
3086+ or would need to convince a user to use a modified device. The issue has
3087+ been patched in v3.5.1. Users are advised to upgrade and should be reminded
3088+ not to plug in unknown USB devices.
3089+Ubuntu-Description:
3090+Notes:
3091+Mitigation:
3092+Bugs:
3093+Priority: low
3094+Discovered-by:
3095+Assigned-to:
3096+CVSS:
3097+
3098+Patches_openrazer:
3099+upstream_openrazer: needs-triage
3100+trusty_openrazer: ignored (out of standard support)
3101+xenial_openrazer: ignored (out of standard support)
3102+bionic_openrazer: DNE
3103+focal_openrazer: needs-triage
3104+jammy_openrazer: needs-triage
3105+kinetic_openrazer: needs-triage
3106+devel_openrazer: needs-triage
3107diff --git a/active/CVE-2022-37325 b/active/CVE-2022-37325
3108new file mode 100644
3109index 0000000..6a034a4
3110--- /dev/null
3111+++ b/active/CVE-2022-37325
3112@@ -0,0 +1,28 @@
3113+Candidate: CVE-2022-37325
3114+PublicDate: 2022-12-06
3115+References:
3116+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325
3117+ https://downloads.asterisk.org/pub/security/AST-2022-007.html
3118+Description:
3119+ In Sangoma Asterisk through 16.28.0, 17.x and 18.x through 18.14.0, and
3120+ 19.x through 19.6.0, an incoming Setup message to
3121+ addons/ooh323c/src/ooq931.c with a malformed Calling or Called Party IE can
3122+ cause a crash.
3123+Ubuntu-Description:
3124+Notes:
3125+Mitigation:
3126+Bugs:
3127+Priority: medium
3128+Discovered-by:
3129+Assigned-to:
3130+CVSS:
3131+
3132+Patches_asterisk:
3133+upstream_asterisk: needs-triage
3134+trusty_asterisk: ignored (out of standard support)
3135+xenial_asterisk: ignored (out of standard support)
3136+bionic_asterisk: needs-triage
3137+focal_asterisk: needs-triage
3138+jammy_asterisk: needs-triage
3139+kinetic_asterisk: needs-triage
3140+devel_asterisk: needs-triage
3141diff --git a/active/CVE-2022-38533 b/active/CVE-2022-38533
3142index c8908b2..52f923d 100644
3143--- a/active/CVE-2022-38533
3144+++ b/active/CVE-2022-38533
3145@@ -1,7 +1,9 @@
3146+PublicDateAtUSN: 2022-08-26 00:15:00 UTC
3147 Candidate: CVE-2022-38533
3148 PublicDate: 2022-08-26 00:15:00 UTC
3149 References:
3150 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38533
3151+ https://ubuntu.com/security/notices/USN-5762-1
3152 Description:
3153 In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error
3154 function bfd_getl32 when called from the strip_main function in strip-new
3155@@ -23,11 +25,11 @@ Patches_binutils:
3156 upstream: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ef186fe54aa6d281a3ff8a9528417e5cc614c797
3157 upstream_binutils: pending (2.40)
3158 trusty/esm_binutils: needed
3159-esm-infra/xenial_binutils: needed
3160+esm-infra/xenial_binutils: released (2.26.1-1ubuntu1~16.04.8+esm5)
3161 trusty_binutils: ignored (out of standard support)
3162 xenial_binutils: ignored (out of standard support)
3163-bionic_binutils: needed
3164-focal_binutils: needed
3165-jammy_binutils: needed
3166-kinetic_binutils: needed
3167+bionic_binutils: released (2.30-21ubuntu1~18.04.8)
3168+focal_binutils: released (2.34-6ubuntu1.4)
3169+jammy_binutils: released (2.38-4ubuntu2.1)
3170+kinetic_binutils: released (2.39-3ubuntu1.1)
3171 devel_binutils: needed
3172diff --git a/active/CVE-2022-40303 b/active/CVE-2022-40303
3173index c1766be..e153bb7 100644
3174--- a/active/CVE-2022-40303
3175+++ b/active/CVE-2022-40303
3176@@ -4,6 +4,7 @@ PublicDate: 2022-11-23 00:15:00 UTC
3177 References:
3178 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40303
3179 https://ubuntu.com/security/notices/USN-5760-1
3180+ https://ubuntu.com/security/notices/USN-5760-2
3181 Description:
3182 An issue was discovered in libxml2 before 2.10.3. When parsing a
3183 multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled,
3184@@ -24,7 +25,7 @@ CVSS:
3185 Patches_libxml2:
3186 upstream: https://gitlab.gnome.org/GNOME/libxml2/-/commit/c846986356fc149915a74972bf198abc266bc2c0
3187 upstream_libxml2: released (2.10.3)
3188-esm-infra/xenial_libxml2: needed
3189+esm-infra/xenial_libxml2: released (2.9.3+dfsg1-1ubuntu0.7+esm4)
3190 trusty_libxml2: ignored (out of standard support)
3191 xenial_libxml2: ignored (out of standard support)
3192 bionic_libxml2: released (2.9.4+dfsg1-6.1ubuntu1.8)
3193@@ -32,4 +33,4 @@ focal_libxml2: released (2.9.10+dfsg-5ubuntu0.20.04.5)
3194 jammy_libxml2: released (2.9.13+dfsg-1ubuntu0.2)
3195 kinetic_libxml2: released (2.9.14+dfsg-1ubuntu0.1)
3196 devel_libxml2: needed
3197-trusty/esm_libxml2: needed
3198+trusty/esm_libxml2: released (2.9.1+dfsg1-3ubuntu4.13+esm4)
3199diff --git a/active/CVE-2022-40304 b/active/CVE-2022-40304
3200index d2506f2..8373f58 100644
3201--- a/active/CVE-2022-40304
3202+++ b/active/CVE-2022-40304
3203@@ -4,6 +4,7 @@ PublicDate: 2022-11-23 18:15:00 UTC
3204 References:
3205 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40304
3206 https://ubuntu.com/security/notices/USN-5760-1
3207+ https://ubuntu.com/security/notices/USN-5760-2
3208 Description:
3209 An issue was discovered in libxml2 before 2.10.3. Certain invalid XML
3210 entity definitions can corrupt a hash table key, potentially leading to
3211@@ -22,7 +23,7 @@ CVSS:
3212 Patches_libxml2:
3213 upstream: https://gitlab.gnome.org/GNOME/libxml2/-/commit/1b41ec4e9433b05bb0376be4725804c54ef1d80b
3214 upstream_libxml2: released (2.10.3)
3215-esm-infra/xenial_libxml2: needed
3216+esm-infra/xenial_libxml2: released (2.9.3+dfsg1-1ubuntu0.7+esm4)
3217 trusty_libxml2: ignored (out of standard support)
3218 xenial_libxml2: ignored (out of standard support)
3219 bionic_libxml2: released (2.9.4+dfsg1-6.1ubuntu1.8)
3220@@ -30,4 +31,4 @@ focal_libxml2: released (2.9.10+dfsg-5ubuntu0.20.04.5)
3221 jammy_libxml2: released (2.9.13+dfsg-1ubuntu0.2)
3222 kinetic_libxml2: released (2.9.14+dfsg-1ubuntu0.1)
3223 devel_libxml2: needs-triage
3224-trusty/esm_libxml2: needed
3225+trusty/esm_libxml2: released (2.9.1+dfsg1-3ubuntu4.13+esm4)
3226diff --git a/active/CVE-2022-4170 b/active/CVE-2022-4170
3227new file mode 100644
3228index 0000000..eef4d0d
3229--- /dev/null
3230+++ b/active/CVE-2022-4170
3231@@ -0,0 +1,27 @@
3232+Candidate: CVE-2022-4170
3233+PublicDate: 2022-12-06
3234+References:
3235+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4170
3236+ https://www.openwall.com/lists/oss-security/2022/12/05/1
3237+ http://cvs.schmorp.de/rxvt-unicode/src/perl/background?r1=1.105&r2=1.109
3238+Description:
3239+ [Unknown description]
3240+Ubuntu-Description:
3241+Notes:
3242+Mitigation:
3243+Bugs:
3244+ http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025489
3245+Priority: medium
3246+Discovered-by:
3247+Assigned-to:
3248+CVSS:
3249+
3250+Patches_rxvt-unicode:
3251+upstream_rxvt-unicode: needs-triage
3252+trusty_rxvt-unicode: ignored (out of standard support)
3253+xenial_rxvt-unicode: ignored (out of standard support)
3254+bionic_rxvt-unicode: needs-triage
3255+focal_rxvt-unicode: needs-triage
3256+jammy_rxvt-unicode: needs-triage
3257+kinetic_rxvt-unicode: needs-triage
3258+devel_rxvt-unicode: needs-triage
3259diff --git a/active/CVE-2022-42705 b/active/CVE-2022-42705
3260new file mode 100644
3261index 0000000..89a63e2
3262--- /dev/null
3263+++ b/active/CVE-2022-42705
3264@@ -0,0 +1,29 @@
3265+Candidate: CVE-2022-42705
3266+PublicDate: 2022-12-06
3267+References:
3268+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705
3269+ https://downloads.asterisk.org/pub/security/AST-2022-008.html
3270+Description:
3271+ A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14,
3272+ 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to
3273+ crash Asterisk (denial of service) by performing activity on a subscription
3274+ via a reliable transport at the same time that Asterisk is also performing
3275+ activity on that subscription.
3276+Ubuntu-Description:
3277+Notes:
3278+Mitigation:
3279+Bugs:
3280+Priority: medium
3281+Discovered-by:
3282+Assigned-to:
3283+CVSS:
3284+
3285+Patches_asterisk:
3286+upstream_asterisk: needs-triage
3287+trusty_asterisk: ignored (out of standard support)
3288+xenial_asterisk: ignored (out of standard support)
3289+bionic_asterisk: needs-triage
3290+focal_asterisk: needs-triage
3291+jammy_asterisk: needs-triage
3292+kinetic_asterisk: needs-triage
3293+devel_asterisk: needs-triage
3294diff --git a/active/CVE-2022-42706 b/active/CVE-2022-42706
3295new file mode 100644
3296index 0000000..65cc814
3297--- /dev/null
3298+++ b/active/CVE-2022-42706
3299@@ -0,0 +1,29 @@
3300+Candidate: CVE-2022-42706
3301+PublicDate: 2022-12-06
3302+References:
3303+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706
3304+ https://downloads.asterisk.org/pub/security/AST-2022-009.html
3305+Description:
3306+ An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18
3307+ through 18.14, 19 through 19.6, and certified through 18.9-cert1.
3308+ GetConfig, via Asterisk Manager Interface, allows a connected application
3309+ to access files outside of the asterisk configuration directory, aka
3310+ Directory Traversal.
3311+Ubuntu-Description:
3312+Notes:
3313+Mitigation:
3314+Bugs:
3315+Priority: medium
3316+Discovered-by:
3317+Assigned-to:
3318+CVSS:
3319+
3320+Patches_asterisk:
3321+upstream_asterisk: needs-triage
3322+trusty_asterisk: ignored (out of standard support)
3323+xenial_asterisk: ignored (out of standard support)
3324+bionic_asterisk: needs-triage
3325+focal_asterisk: needs-triage
3326+jammy_asterisk: needs-triage
3327+kinetic_asterisk: needs-triage
3328+devel_asterisk: needs-triage
3329diff --git a/active/CVE-2022-42919 b/active/CVE-2022-42919
3330index e25c604..c6b41d6 100644
3331--- a/active/CVE-2022-42919
3332+++ b/active/CVE-2022-42919
3333@@ -122,4 +122,4 @@ bionic_python3.11: DNE
3334 focal_python3.11: DNE
3335 jammy_python3.11: needed
3336 kinetic_python3.11: needed
3337-devel_python3.11: needed
3338+devel_python3.11: not-affected (3.11.0-3)
3339diff --git a/active/CVE-2022-4292 b/active/CVE-2022-4292
3340new file mode 100644
3341index 0000000..f641a65
3342--- /dev/null
3343+++ b/active/CVE-2022-4292
3344@@ -0,0 +1,29 @@
3345+Candidate: CVE-2022-4292
3346+PublicDate: 2022-12-06
3347+References:
3348+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4292
3349+ https://huntr.dev/bounties/da3d4c47-e57a-451e-993d-9df0ed31f57b
3350+ https://github.com/vim/vim/commit/c3d27ada14acd02db357f2d16347acc22cb17e93 (v9.0.0882)
3351+ https://github.com/vim/vim/commit/c3d27ada14acd02db357f2d16347acc22cb17e93
3352+Description:
3353+ Use After Free in GitHub repository vim/vim prior to 9.0.0882.
3354+Ubuntu-Description:
3355+Notes:
3356+Mitigation:
3357+Bugs:
3358+Priority: low
3359+Discovered-by:
3360+Assigned-to:
3361+CVSS:
3362+
3363+Patches_vim:
3364+upstream_vim: needs-triage
3365+esm-infra/xenial_vim: needs-triage
3366+trusty_vim: ignored (out of standard support)
3367+xenial_vim: ignored (out of standard support)
3368+bionic_vim: needs-triage
3369+focal_vim: needs-triage
3370+jammy_vim: needs-triage
3371+kinetic_vim: needs-triage
3372+trusty/esm_vim: needs-triage
3373+devel_vim: needs-triage
3374diff --git a/active/CVE-2022-4293 b/active/CVE-2022-4293
3375new file mode 100644
3376index 0000000..9a6dab6
3377--- /dev/null
3378+++ b/active/CVE-2022-4293
3379@@ -0,0 +1,30 @@
3380+Candidate: CVE-2022-4293
3381+PublicDate: 2022-12-06
3382+References:
3383+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4293
3384+ https://huntr.dev/bounties/385a835f-6e33-4d00-acce-ac99f3939143
3385+ https://github.com/vim/vim/commit/cdef1cefa2a440911c727558562f83ed9b00e16b (v9.0.0804)
3386+ https://github.com/vim/vim/commit/cdef1cefa2a440911c727558562f83ed9b00e16b
3387+Description:
3388+ Floating Point Comparison with Incorrect Operator in GitHub repository
3389+ vim/vim prior to 9.0.0804.
3390+Ubuntu-Description:
3391+Notes:
3392+Mitigation:
3393+Bugs:
3394+Priority: low
3395+Discovered-by:
3396+Assigned-to:
3397+CVSS:
3398+
3399+Patches_vim:
3400+upstream_vim: released (2:9.0.0813-1)
3401+esm-infra/xenial_vim: needs-triage
3402+trusty_vim: ignored (out of standard support)
3403+xenial_vim: ignored (out of standard support)
3404+bionic_vim: needs-triage
3405+focal_vim: needs-triage
3406+jammy_vim: needs-triage
3407+kinetic_vim: needs-triage
3408+trusty/esm_vim: needs-triage
3409+devel_vim: needs-triage
3410diff --git a/active/CVE-2022-43497 b/active/CVE-2022-43497
3411new file mode 100644
3412index 0000000..886976d
3413--- /dev/null
3414+++ b/active/CVE-2022-43497
3415@@ -0,0 +1,28 @@
3416+Candidate: CVE-2022-43497
3417+PublicDate: 2022-12-06
3418+References:
3419+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43497
3420+ https://wordpress.org/news/2022/10/wordpress-6-0-3-security-release/
3421+ https://jvn.jp/en/jp/JVN09409909/index.html
3422+ https://wordpress.org/download/
3423+Description:
3424+ Cross-site scripting vulnerability in WordPress versions prior to 6.0.3
3425+ allows a remote unauthenticated attacker to inject an arbitrary script .
3426+Ubuntu-Description:
3427+Notes:
3428+Mitigation:
3429+Bugs:
3430+Priority: medium
3431+Discovered-by:
3432+Assigned-to:
3433+CVSS:
3434+
3435+Patches_wordpress:
3436+upstream_wordpress: needs-triage
3437+trusty_wordpress: ignored (out of standard support)
3438+xenial_wordpress: ignored (out of standard support)
3439+bionic_wordpress: needs-triage
3440+focal_wordpress: needs-triage
3441+jammy_wordpress: needs-triage
3442+kinetic_wordpress: needs-triage
3443+devel_wordpress: needs-triage
3444diff --git a/active/CVE-2022-43500 b/active/CVE-2022-43500
3445new file mode 100644
3446index 0000000..f5064e8
3447--- /dev/null
3448+++ b/active/CVE-2022-43500
3449@@ -0,0 +1,28 @@
3450+Candidate: CVE-2022-43500
3451+PublicDate: 2022-12-06
3452+References:
3453+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43500
3454+ https://wordpress.org/news/2022/10/wordpress-6-0-3-security-release/
3455+ https://jvn.jp/en/jp/JVN09409909/index.html
3456+ https://wordpress.org/download/
3457+Description:
3458+ Cross-site scripting vulnerability in WordPress versions prior to 6.0.3
3459+ allows a remote unauthenticated attacker to inject an arbitrary script .
3460+Ubuntu-Description:
3461+Notes:
3462+Mitigation:
3463+Bugs:
3464+Priority: medium
3465+Discovered-by:
3466+Assigned-to:
3467+CVSS:
3468+
3469+Patches_wordpress:
3470+upstream_wordpress: needs-triage
3471+trusty_wordpress: ignored (out of standard support)
3472+xenial_wordpress: ignored (out of standard support)
3473+bionic_wordpress: needs-triage
3474+focal_wordpress: needs-triage
3475+jammy_wordpress: needs-triage
3476+kinetic_wordpress: needs-triage
3477+devel_wordpress: needs-triage
3478diff --git a/active/CVE-2022-43504 b/active/CVE-2022-43504
3479new file mode 100644
3480index 0000000..fceca9e
3481--- /dev/null
3482+++ b/active/CVE-2022-43504
3483@@ -0,0 +1,29 @@
3484+Candidate: CVE-2022-43504
3485+PublicDate: 2022-12-06
3486+References:
3487+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43504
3488+ https://wordpress.org/news/2022/10/wordpress-6-0-3-security-release/
3489+ https://jvn.jp/en/jp/JVN09409909/index.html
3490+ https://wordpress.org/download/
3491+Description:
3492+ Improper authentication vulnerability in WordPress versions prior to 6.0.3
3493+ allows a remote unauthenticated attacker to obtain the email address of the
3494+ user who posted a blog using the WordPress Post by Email Feature.
3495+Ubuntu-Description:
3496+Notes:
3497+Mitigation:
3498+Bugs:
3499+Priority: low
3500+Discovered-by:
3501+Assigned-to:
3502+CVSS:
3503+
3504+Patches_wordpress:
3505+upstream_wordpress: needs-triage
3506+trusty_wordpress: ignored (out of standard support)
3507+xenial_wordpress: ignored (out of standard support)
3508+bionic_wordpress: needs-triage
3509+focal_wordpress: needs-triage
3510+jammy_wordpress: needs-triage
3511+kinetic_wordpress: needs-triage
3512+devel_wordpress: needs-triage
3513diff --git a/active/CVE-2022-43515 b/active/CVE-2022-43515
3514new file mode 100644
3515index 0000000..63eaca3
3516--- /dev/null
3517+++ b/active/CVE-2022-43515
3518@@ -0,0 +1,31 @@
3519+Candidate: CVE-2022-43515
3520+PublicDate: 2022-12-06
3521+References:
3522+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43515
3523+ https://support.zabbix.com/browse/ZBXSEC-125
3524+Description:
3525+ Zabbix Frontend provides a feature that allows admins to maintain the
3526+ installation and ensure that only certain IP addresses can access it. In
3527+ this way, any user will not be able to access the Zabbix Frontend while it
3528+ is being maintained and possible sensitive data will be prevented from
3529+ being disclosed. An attacker can bypass this protection and access the
3530+ instance using IP address not listed in the defined range.
3531+Ubuntu-Description:
3532+Notes:
3533+Mitigation:
3534+Bugs:
3535+Priority: medium
3536+Discovered-by:
3537+Assigned-to:
3538+CVSS:
3539+
3540+Patches_zabbix:
3541+upstream_zabbix: needs-triage
3542+trusty_zabbix: ignored (out of standard support)
3543+xenial_zabbix: ignored (out of standard support)
3544+bionic_zabbix: needs-triage
3545+focal_zabbix: needs-triage
3546+jammy_zabbix: needs-triage
3547+kinetic_zabbix: needs-triage
3548+trusty/esm_zabbix: needs-triage
3549+devel_zabbix: needs-triage
3550diff --git a/active/CVE-2022-45283 b/active/CVE-2022-45283
3551new file mode 100644
3552index 0000000..d6b9b1f
3553--- /dev/null
3554+++ b/active/CVE-2022-45283
3555@@ -0,0 +1,27 @@
3556+Candidate: CVE-2022-45283
3557+PublicDate: 2022-12-06
3558+References:
3559+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45283
3560+ https://github.com/gpac/gpac/issues/2295
3561+Description:
3562+ GPAC MP4box v2.0.0 was discovered to contain a stack overflow in the
3563+ smil_parse_time_list parameter at /scenegraph/svg_attributes.c.
3564+Ubuntu-Description:
3565+Notes:
3566+Mitigation:
3567+Bugs:
3568+Priority: medium
3569+Discovered-by:
3570+Assigned-to:
3571+CVSS:
3572+
3573+Patches_gpac:
3574+upstream_gpac: needs-triage
3575+trusty_gpac: ignored (out of standard support)
3576+xenial_gpac: ignored (out of standard support)
3577+bionic_gpac: needs-triage
3578+focal_gpac: needs-triage
3579+jammy_gpac: needs-triage
3580+kinetic_gpac: needs-triage
3581+trusty/esm_gpac: needs-triage
3582+devel_gpac: needs-triage
3583diff --git a/active/CVE-2022-46169 b/active/CVE-2022-46169
3584new file mode 100644
3585index 0000000..f5b58f4
3586--- /dev/null
3587+++ b/active/CVE-2022-46169
3588@@ -0,0 +1,78 @@
3589+Candidate: CVE-2022-46169
3590+PublicDate: 2022-12-06
3591+References:
3592+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46169
3593+ https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf
3594+ https://github.com/Cacti/cacti/commit/b43f13ae7f1e6bfe4e8e56a80a7cd867cf2db52b
3595+ https://github.com/Cacti/cacti/commit/a8d59e8fa5f0054aa9c6981b1cbe30ef0e2a0ec9
3596+ https://github.com/Cacti/cacti/commit/7f0e16312dd5ce20f93744ef8b9c3b0f1ece2216
3597+Description:
3598+ Cacti is an open source platform which provides a robust and extensible
3599+ operational monitoring and fault management framework for users. In
3600+ affected versions a command injection vulnerability allows an
3601+ unauthenticated user to execute arbitrary code on a server running Cacti,
3602+ if a specific data source was selected for any monitored device. The
3603+ vulnerability resides in the `remote_agent.php` file. This file can be
3604+ accessed without authentication. This function retrieves the IP address of
3605+ the client via `get_client_addr` and resolves this IP address to the
3606+ corresponding hostname via `gethostbyaddr`. After this, it is verified that
3607+ an entry within the `poller` table exists, where the hostname corresponds
3608+ to the resolved hostname. If such an entry was found, the function returns
3609+ `true` and the client is authorized. This authorization can be bypassed due
3610+ to the implementation of the `get_client_addr` function. The function is
3611+ defined in the file `lib/functions.php` and checks serval `$_SERVER`
3612+ variables to determine the IP address of the client. The variables
3613+ beginning with `HTTP_` can be arbitrarily set by an attacker. Since there
3614+ is a default entry in the `poller` table with the hostname of the server
3615+ running Cacti, an attacker can bypass the authentication e.g. by providing
3616+ the header `Forwarded-For: <TARGETIP>`. This way the function
3617+ `get_client_addr` returns the IP address of the server running Cacti. The
3618+ following call to `gethostbyaddr` will resolve this IP address to the
3619+ hostname of the server, which will pass the `poller` hostname check because
3620+ of the default entry. After the authorization of the `remote_agent.php`
3621+ file is bypassed, an attacker can trigger different actions. One of these
3622+ actions is called `polldata`. The called function `poll_for_data` retrieves
3623+ a few request parameters and loads the corresponding `poller_item` entries
3624+ from the database. If the `action` of a `poller_item` equals
3625+ `POLLER_ACTION_SCRIPT_PHP`, the function `proc_open` is used to execute a
3626+ PHP script. The attacker-controlled parameter `$poller_id` is retrieved via
3627+ the function `get_nfilter_request_var`, which allows arbitrary strings.
3628+ This variable is later inserted into the string passed to `proc_open`,
3629+ which leads to a command injection vulnerability. By e.g. providing the
3630+ `poller_id=;id` the `id` command is executed. In order to reach the
3631+ vulnerable call, the attacker must provide a `host_id` and `local_data_id`,
3632+ where the `action` of the corresponding `poller_item` is set to
3633+ `POLLER_ACTION_SCRIPT_PHP`. Both of these ids (`host_id` and
3634+ `local_data_id`) can easily be bruteforced. The only requirement is that a
3635+ `poller_item` with an `POLLER_ACTION_SCRIPT_PHP` action exists. This is
3636+ very likely on a productive instance because this action is added by some
3637+ predefined templates like `Device - Uptime` or `Device - Polling Time`.
3638+ This command injection vulnerability allows an unauthenticated user to
3639+ execute arbitrary commands if a `poller_item` with the `action` type
3640+ `POLLER_ACTION_SCRIPT_PHP` (`2`) is configured. The authorization bypass
3641+ should be prevented by not allowing an attacker to make `get_client_addr`
3642+ (file `lib/functions.php`) return an arbitrary IP address. This could be
3643+ done by not honoring the `HTTP_...` `$_SERVER` variables. If these should
3644+ be kept for compatibility reasons it should at least be prevented to fake
3645+ the IP address of the server running Cacti. This vulnerability has been
3646+ addressed in both the 1.2.x and 1.3.x release branches with `1.2.23` being
3647+ the first release containing the patch.
3648+Ubuntu-Description:
3649+Notes:
3650+Mitigation:
3651+Bugs:
3652+Priority: medium
3653+Discovered-by:
3654+Assigned-to:
3655+CVSS:
3656+
3657+Patches_cacti:
3658+upstream_cacti: needs-triage
3659+trusty_cacti: ignored (out of standard support)
3660+xenial_cacti: ignored (out of standard support)
3661+bionic_cacti: needs-triage
3662+focal_cacti: needs-triage
3663+jammy_cacti: needs-triage
3664+kinetic_cacti: needs-triage
3665+trusty/esm_cacti: needs-triage
3666+devel_cacti: needs-triage
3667diff --git a/check-cves.log b/check-cves.log
3668index 32036f4..7d18d5c 100644
3669--- a/check-cves.log
3670+++ b/check-cves.log
3671@@ -7258,3 +7258,5 @@
3672 2022-12-01 13:34:56 UTC - 1 added, 0 ignored, 0 skipped, 1 total - files: ['cve-feed.json']
3673 2022-12-05 02:53:35 UTC - 7 added, 366 ignored, 0 skipped, 373 total - files: ['nvdcve-1.1-2004.json', 'nvdcve-1.1-2005.json', 'nvdcve-1.1-2006.json', 'nvdcve-1.1-2007.json', 'nvdcve-1.1-2008.json', 'nvdcve-1.1-2009.json', 'nvdcve-1.1-2010.json', 'nvdcve-1.1-2011.json', 'nvdcve-1.1-2012.json', 'nvdcve-1.1-2013.json', 'nvdcve-1.1-2014.json', 'nvdcve-1.1-2015.json', 'nvdcve-1.1-2016.json', 'nvdcve-1.1-2017.json', 'nvdcve-1.1-2018.json', 'nvdcve-1.1-2019.json', 'nvdcve-1.1-2020.json', 'nvdcve-1.1-2021.json', 'nvdcve-1.1-2022.json', 'nvdcve-1.1-recent.json']
3674 2022-12-05 03:24:07 UTC - 22 added, 1 ignored, 0 skipped, 23 total - files: ['debian-import_npzhqw40.json']
3675+2022-12-06 04:29:18 UTC - 13 added, 87 ignored, 0 skipped, 100 total - files: ['nvdcve-1.1-recent.json']
3676+2022-12-06 04:42:20 UTC - 5 added, 0 ignored, 0 skipped, 5 total - files: ['debian-import_d8b4xdcy.json']
3677diff --git a/ignored/not-for-us.txt b/ignored/not-for-us.txt
3678index f9115c7..4b2ad36 100644
3679--- a/ignored/not-for-us.txt
3680+++ b/ignored/not-for-us.txt
3681@@ -138543,3 +138543,90 @@ CVE-2021-37533 # Apache Commons Net
3682 CVE-2022-4273 # SourceCodester Human Resource Management System
3683 CVE-2022-4272 # FeMiner wms
3684 CVE-2022-45797 # Trend Micro
3685+CVE-2022-4173 # Avast and AVG Antivirus
3686+CVE-2022-44009 # StackStorm
3687+CVE-2022-40918 # firmware lewei_cam binary
3688+CVE-2022-38337 # MobaXterm
3689+CVE-2022-38336 # MobaXterm
3690+CVE-2021-39434 # ZKTeco ZKTime
3691+CVE-2022-46464 # ConcreteCMS
3692+CVE-2022-45990 # Ecommerce-Website
3693+CVE-2022-45769 # ClicShopping_V3
3694+CVE-2022-45020 # Rukovoditel
3695+CVE-2022-45019 # SLiMS
3696+CVE-2022-43706 # StackStorm
3697+CVE-2022-45912 # Zimbra Collaboration
3698+CVE-2022-43557 # BD BodyGuard infusion pumps
3699+CVE-2022-43556 # Concrete CMS
3700+CVE-2022-43553 # EdgeRouters
3701+CVE-2022-43549 # Veeam Backup for Google Cloud
3702+CVE-2022-40259 # AMI MegaRAC
3703+CVE-2022-40242 # AMI MegaRAC
3704+CVE-2022-35259 # Endpoint Manager
3705+CVE-2022-35258 # Ivanti Connect Secure
3706+CVE-2022-35254 # Ivanti Connect Secure
3707+CVE-2022-2827 # AMI MegaRAC
3708+CVE-2022-27773 # Ivanti EPM
3709+CVE-2022-23143 # ZTE
3710+CVE-2022-46164 # NodeBB
3711+CVE-2022-45481 # Lazy Mouse
3712+CVE-2022-45479 # PC Keyboard
3713+CVE-2022-44039 # Franklin Fueling System FFS Colibri
3714+CVE-2022-37783 # All Craft CMS
3715+CVE-2021-34181 # TomExam
3716+CVE-2022-45771 # Pwndoc
3717+CVE-2022-43097 # Phpgurukul
3718+CVE-2022-3926 # WordPress plugin
3719+CVE-2022-3909 # WordPress plugin
3720+CVE-2022-3907 # WordPress plugin
3721+CVE-2022-3892 # WordPress plugin
3722+CVE-2022-3858 # WordPress plugin
3723+CVE-2022-3856 # WordPress plugin
3724+CVE-2022-3846 # WordPress theme
3725+CVE-2022-3838 # WordPress plugin
3726+CVE-2022-3837 # WordPress plugin
3727+CVE-2022-3830 # WordPress plugin
3728+CVE-2022-3694 # WordPress plugin
3729+CVE-2022-3677 # WordPress plugin
3730+CVE-2022-3426 # WordPress plugin
3731+CVE-2022-3249 # WordPress plugin
3732+CVE-2022-1540 # WordPress plugin
3733+CVE-2022-45478 # Telepad
3734+CVE-2022-45477 # Telepad
3735+CVE-2022-45315 # Mikrotik
3736+CVE-2022-45313 # Mikrotik
3737+CVE-2022-32634 # MediaTek
3738+CVE-2022-32633 # MediaTek
3739+CVE-2022-32632 # MediaTek
3740+CVE-2022-32631 # MediaTek
3741+CVE-2022-32630 # MediaTek
3742+CVE-2022-32629 # MediaTek
3743+CVE-2022-32628 # MediaTek
3744+CVE-2022-32626 # MediaTek
3745+CVE-2022-32625 # MediaTek
3746+CVE-2022-32624 # MediaTek
3747+CVE-2022-32622 # MediaTek
3748+CVE-2022-32621 # MediaTek
3749+CVE-2022-32620 # MediaTek
3750+CVE-2022-32619 # MediaTek
3751+CVE-2022-32598 # MediaTek
3752+CVE-2022-32597 # MediaTek
3753+CVE-2022-32596 # MediaTek
3754+CVE-2022-32594 # MediaTek
3755+CVE-2022-45046 # Apache Camel
3756+CVE-2022-45824 # WordPress plugin
3757+CVE-2022-45822 # WordPress plugin
3758+CVE-2022-4282 # SpringBootCMS
3759+CVE-2022-4281 # Facepay
3760+CVE-2022-43499 # SHIRASAGI
3761+CVE-2022-43487 # Salon booking system
3762+CVE-2022-43484 # TERASOLUNA
3763+CVE-2022-43479 # SHIRASAGI
3764+CVE-2022-43470 # +F software
3765+CVE-2022-43442 # +F software
3766+CVE-2022-42496 # Nako3edit
3767+CVE-2022-41830 # Kyocera Document Solutions
3768+CVE-2022-41807 # Kyocera Document Solutions
3769+CVE-2022-41798 # Kyocera Document Solutions
3770+CVE-2022-41777 # Nako3edit
3771+CVE-2022-41642 # Nako3edit
3772diff --git a/retired/CVE-2022-43516 b/retired/CVE-2022-43516
3773new file mode 100644
3774index 0000000..c2f735d
3775--- /dev/null
3776+++ b/retired/CVE-2022-43516
3777@@ -0,0 +1,29 @@
3778+Candidate: CVE-2022-43516
3779+PublicDate: 2022-12-06
3780+References:
3781+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43516
3782+ https://support.zabbix.com/browse/ZBX-22002
3783+Description:
3784+ A Firewall Rule which allows all incoming TCP connections to all programs
3785+ from any source and to all ports is created in Windows Firewall after
3786+ Zabbix agent installation (MSI)
3787+Ubuntu-Description:
3788+Notes:
3789+ amurray| appears to only affect zabbix on Windows
3790+Mitigation:
3791+Bugs:
3792+Priority: negligible
3793+Discovered-by:
3794+Assigned-to:
3795+CVSS:
3796+
3797+Patches_zabbix:
3798+upstream_zabbix: needs-triage
3799+trusty_zabbix: ignored (out of standard support)
3800+xenial_zabbix: ignored (out of standard support)
3801+bionic_zabbix: not-affected (Windows only)
3802+focal_zabbix: not-affected (Windows only)
3803+jammy_zabbix: not-affected (Windows only)
3804+kinetic_zabbix: not-affected (Windows only)
3805+trusty/esm_zabbix: not-affected (Windows only)
3806+devel_zabbix: not-affected (Windows only)
3807diff --git a/scripts/check-cves-mode.el b/scripts/check-cves-mode.el
3808index 92e334b..1f02b26 100644
3809--- a/scripts/check-cves-mode.el
3810+++ b/scripts/check-cves-mode.el
3811@@ -121,7 +121,11 @@ A negative argument means move forward that many keywords."
3812
3813 (defvar check-cves-mode-source-packages
3814 (split-string
3815- (shell-command-to-string "source ~/.ubuntu-cve-tracker.conf; cat $packages_mirror/sources")))
3816+ (shell-command-to-string "umt grep '.*'")))
3817+
3818+(defvar check-cves-mode-binary-packages
3819+ (split-string
3820+ (shell-command-to-string "dpkg-query --show --showformat '${Package}\n'")))
3821
3822 (defun check-cves-mode-prompt-for-packages (&optional chosen)
3823 "Prompt user for a list of source packages excluding CHOSEN."
3824@@ -253,6 +257,8 @@ A negative argument means move forward that many keywords."
3825
3826 (defun check-cves-mode-prompt-with-suggested-names (prompt &optional history names)
3827 "Get the suggested NAMES from the ignore line for this CVE via PROMPT with HISTORY."
3828+ (if (and names (symbolp names) (not (functionp names)))
3829+ (setq names (eval names)))
3830 (list (completing-read prompt (or names (check-cves-mode-suggested-names))
3831 nil nil nil history)))
3832
3833@@ -330,11 +336,13 @@ identifier (XXXX-YYYY) via `format'.")
3834 `((:name "apt show"
3835 :command "apt show %s"
3836 :downcase t
3837- :mode compilation-mode)
3838+ :mode compilation-mode
3839+ :candidates check-cves-mode-binary-packages)
3840 (:name "apt showsrc"
3841 :command "apt showsrc %s"
3842 :downcase t
3843- :mode compilation-mode)
3844+ :mode compilation-mode
3845+ :candidates check-cves-mode-source-packages)
3846 (:name "apt search (host)"
3847 :command "apt search %s"
3848 :mode compilation-mode)
3849@@ -351,7 +359,8 @@ identifier (XXXX-YYYY) via `format'.")
3850 (:name "rmadison"
3851 :command "rmadison %s"
3852 :downcase t
3853- :mode compilation-mode)
3854+ :mode compilation-mode
3855+ :candidates check-cves-mode-source-packages)
3856 (:name "umt grep"
3857 :command "umt grep %s"
3858 :downcase t
3859@@ -359,7 +368,8 @@ identifier (XXXX-YYYY) via `format'.")
3860 (:name "umt search"
3861 :command "umt search %s"
3862 :downcase t
3863- :mode compilation-mode)
3864+ :mode compilation-mode
3865+ :candidates check-cves-mode-source-packages)
3866 (:name "command-not-found"
3867 :command "/usr/lib/command-not-found %s"
3868 :downcase t
3869@@ -410,11 +420,16 @@ identifier (XXXX-YYYY) via `format'.")
3870 (defun check-cves-mode-search (tool-name keywords)
3871 "Search the current CVEs KEYWORDS with TOOL-NAME (apt / umt etc)."
3872 (interactive
3873- (list
3874- (completing-read "Tool: "
3875- (mapcar #'(lambda (e) (plist-get e :name))
3876- check-cves-mode-search-tools))
3877- (check-cves-mode-prompt-with-suggested-names "Keywords: ")))
3878+ (let* ((name (completing-read "Tool: "
3879+ (mapcar #'(lambda (e) (plist-get e :name))
3880+ check-cves-mode-search-tools)
3881+ nil t))
3882+ (tool (check-cves-mode-find-search-tool name)))
3883+ (list
3884+ name
3885+ (check-cves-mode-prompt-with-suggested-names "Keywords: "
3886+ nil
3887+ (plist-get tool :candidates)))))
3888 (let ((tool (check-cves-mode-find-search-tool tool-name))
3889 (words (mapconcat #'identity keywords " ")))
3890 (unless tool
3891diff --git a/scripts/cve-mode.el b/scripts/cve-mode.el
3892index 4f67f64..cc1b1f8 100644
3893--- a/scripts/cve-mode.el
3894+++ b/scripts/cve-mode.el
3895@@ -295,7 +295,7 @@ When set to first, following lines will be indented by an extra space."
3896
3897 (defvar cve-mode--source-packages
3898 (split-string
3899- (shell-command-to-string "source ~/.ubuntu-cve-tracker.conf; cat $packages_mirror/sources")))
3900+ (shell-command-to-string "umt grep '.*'")))
3901
3902 (defvar cve-mode--packages-releases nil)
3903
3904diff --git a/scripts/publish-cves-to-website-api.py b/scripts/publish-cves-to-website-api.py
3905index f5e957b..1adc0bd 100755
3906--- a/scripts/publish-cves-to-website-api.py
3907+++ b/scripts/publish-cves-to-website-api.py
3908@@ -203,6 +203,13 @@ def main():
3909 default=25,
3910 )
3911 parser.add_argument(
3912+ "--endpoint",
3913+ action="store",
3914+ type=str,
3915+ default="https://ubuntu.com/security/",
3916+ help="API endpoint url. default is https://ubuntu.com/security/",
3917+ )
3918+ parser.add_argument(
3919 "file_path",
3920 action="store",
3921 type=str,
3922@@ -211,8 +218,6 @@ def main():
3923 )
3924 args = parser.parse_args()
3925
3926- url = "https://ubuntu.com/security/"
3927-
3928 ## if args:
3929 ## headers = {"Content-type": "application/json"}
3930 cves = []
3931@@ -283,7 +288,7 @@ def main():
3932 for chunk in [
3933 cves[i : i + chunksize] for i in range(0, len(cves), chunksize) # noqa: E203
3934 ]:
3935- push_chunks(args, url, chunk)
3936+ push_chunks(args, args.endpoint, chunk)
3937
3938 for cve_id in cache_not_for_us_cve_ids:
3939 add_cve_to_ignore_cache(cve_id)

Subscribers

People subscribed via source and target branches