Merge ~pfsmorigo/ubuntu-cve-tracker:pfsmorigo/add_endpont_argument into ubuntu-cve-tracker:master

Proposed by Paulo Flabiano Smorigo
Status: Merged
Merge reported by: Paulo Flabiano Smorigo
Merged at revision: d17cea6985a4ab0fd954d17d738df44bfa62fdce
Proposed branch: ~pfsmorigo/ubuntu-cve-tracker:pfsmorigo/add_endpont_argument
Merge into: ubuntu-cve-tracker:master
Diff against target: 3939 lines (+3623/-25)
28 files modified
active/CVE-2021-3449 (+1/-1)
active/CVE-2022-20565 (+757/-0)
active/CVE-2022-20566 (+757/-0)
active/CVE-2022-20567 (+757/-0)
active/CVE-2022-20568 (+759/-0)
active/CVE-2022-23467 (+33/-0)
active/CVE-2022-37325 (+28/-0)
active/CVE-2022-38533 (+7/-5)
active/CVE-2022-40303 (+3/-2)
active/CVE-2022-40304 (+3/-2)
active/CVE-2022-4170 (+27/-0)
active/CVE-2022-42705 (+29/-0)
active/CVE-2022-42706 (+29/-0)
active/CVE-2022-42919 (+1/-1)
active/CVE-2022-4292 (+29/-0)
active/CVE-2022-4293 (+30/-0)
active/CVE-2022-43497 (+28/-0)
active/CVE-2022-43500 (+28/-0)
active/CVE-2022-43504 (+29/-0)
active/CVE-2022-43515 (+31/-0)
active/CVE-2022-45283 (+27/-0)
active/CVE-2022-46169 (+78/-0)
check-cves.log (+2/-0)
ignored/not-for-us.txt (+87/-0)
retired/CVE-2022-43516 (+29/-0)
scripts/check-cves-mode.el (+25/-10)
scripts/cve-mode.el (+1/-1)
scripts/publish-cves-to-website-api.py (+8/-3)
Reviewer Review Type Date Requested Status
Steve Beattie Approve
Alex Murray Approve
Review via email: mp+434171@code.launchpad.net
To post a comment you must log in.
Revision history for this message
Alex Murray (alexmurray) wrote :

LGTM!

review: Approve
Revision history for this message
Steve Beattie (sbeattie) wrote :

Agreed, LGTM, please merge.

It might make sense in a followup commit to convert to using argparse's formatter_class=argparse.ArgumentDefaultsHelpFormatter instead of repeating the URL in the help message (it would also give notice that the default action for this script is to add a USN). Given that the script is usually inoked by wrapper scripts and not commonly invoked directly, it's not a particularly important thing.

Thanks!

review: Approve

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
diff --git a/active/CVE-2021-3449 b/active/CVE-2021-3449
index 76361e6..4b45060 100644
--- a/active/CVE-2021-3449
+++ b/active/CVE-2021-3449
@@ -143,7 +143,7 @@ upstream_postgresql-9.5: needs-triage
143trusty_postgresql-9.5: DNE143trusty_postgresql-9.5: DNE
144trusty/esm_postgresql-9.5: DNE144trusty/esm_postgresql-9.5: DNE
145xenial_postgresql-9.5: ignored (end of standard support, was needs-triage)145xenial_postgresql-9.5: ignored (end of standard support, was needs-triage)
146esm-infra/xenial_postgresql-9.5: needs-triage146esm-infra/xenial_postgresql-9.5: not-affected (code not present)
147bionic_postgresql-9.5: DNE147bionic_postgresql-9.5: DNE
148focal_postgresql-9.5: DNE148focal_postgresql-9.5: DNE
149hirsute_postgresql-9.5: DNE149hirsute_postgresql-9.5: DNE
diff --git a/active/CVE-2022-20565 b/active/CVE-2022-20565
150new file mode 100644150new file mode 100644
index 0000000..c8207ef
--- /dev/null
+++ b/active/CVE-2022-20565
@@ -0,0 +1,757 @@
1Candidate: CVE-2022-20565
2PublicDate: 2022-12-06
3References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20565
5 https://git.kernel.org/linus/bce1305c0ece3dc549663605e567655dd701752c
6Description:
7 [Unknown description]
8Ubuntu-Description:
9Notes:
10Mitigation:
11Bugs:
12Priority: medium
13Discovered-by:
14Assigned-to:
15CVSS:
16
17Patches_linux:
18 break-fix: - bce1305c0ece3dc549663605e567655dd701752c
19upstream_linux: released (5.8.7-1)
20esm-infra/xenial_linux: needs-triage
21trusty_linux: ignored (out of standard support)
22xenial_linux: ignored (out of standard support)
23bionic_linux: needs-triage
24focal_linux: needs-triage
25jammy_linux: not-affected (5.15.0-56.62)
26kinetic_linux: not-affected
27trusty/esm_linux: not-affected
28devel_linux: not-affected
29
30Patches_linux-hwe:
31upstream_linux-hwe: needs-triage
32esm-infra/xenial_linux-hwe: needs-triage
33trusty_linux-hwe: DNE
34xenial_linux-hwe: ignored (end of standard support)
35bionic_linux-hwe: ignored (replaced by linux-hwe-5.4)
36focal_linux-hwe: DNE
37jammy_linux-hwe: DNE
38kinetic_linux-hwe: DNE
39
40Patches_linux-hwe-5.4:
41upstream_linux-hwe-5.4: needs-triage
42trusty_linux-hwe-5.4: DNE
43xenial_linux-hwe-5.4: DNE
44bionic_linux-hwe-5.4: needs-triage
45focal_linux-hwe-5.4: DNE
46jammy_linux-hwe-5.4: DNE
47kinetic_linux-hwe-5.4: DNE
48
49Patches_linux-hwe-5.8:
50upstream_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11)
51trusty_linux-hwe-5.8: DNE
52xenial_linux-hwe-5.8: DNE
53bionic_linux-hwe-5.8: DNE
54focal_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11)
55jammy_linux-hwe-5.8: DNE
56kinetic_linux-hwe-5.8: DNE
57
58Patches_linux-hwe-5.11:
59upstream_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13)
60trusty_linux-hwe-5.11: DNE
61xenial_linux-hwe-5.11: DNE
62bionic_linux-hwe-5.11: DNE
63focal_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13)
64jammy_linux-hwe-5.11: DNE
65kinetic_linux-hwe-5.11: DNE
66
67Patches_linux-hwe-5.13:
68upstream_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15)
69trusty_linux-hwe-5.13: DNE
70xenial_linux-hwe-5.13: DNE
71bionic_linux-hwe-5.13: DNE
72focal_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15)
73jammy_linux-hwe-5.13: DNE
74kinetic_linux-hwe-5.13: DNE
75
76Patches_linux-hwe-5.15:
77upstream_linux-hwe-5.15: needs-triage
78trusty_linux-hwe-5.15: DNE
79xenial_linux-hwe-5.15: DNE
80bionic_linux-hwe-5.15: DNE
81focal_linux-hwe-5.15: needs-triage
82jammy_linux-hwe-5.15: DNE
83kinetic_linux-hwe-5.15: DNE
84
85Patches_linux-hwe-edge:
86upstream_linux-hwe-edge: needs-triage
87esm-infra/xenial_linux-hwe-edge: ignored (superseded by linux-hwe)
88trusty_linux-hwe-edge: DNE
89xenial_linux-hwe-edge: ignored (superseded by linux-hwe)
90bionic_linux-hwe-edge: ignored (superseded by linux-hwe-5.4)
91focal_linux-hwe-edge: DNE
92jammy_linux-hwe-edge: DNE
93kinetic_linux-hwe-edge: DNE
94
95Patches_linux-lts-xenial:
96upstream_linux-lts-xenial: needs-triage
97trusty_linux-lts-xenial: ignored (out of standard support)
98xenial_linux-lts-xenial: DNE
99bionic_linux-lts-xenial: DNE
100focal_linux-lts-xenial: DNE
101jammy_linux-lts-xenial: DNE
102kinetic_linux-lts-xenial: DNE
103trusty/esm_linux-lts-xenial: needs-triage
104
105Patches_linux-kvm:
106upstream_linux-kvm: needs-triage
107esm-infra/xenial_linux-kvm: needs-triage
108trusty_linux-kvm: DNE
109xenial_linux-kvm: ignored (end of standard support)
110bionic_linux-kvm: needs-triage
111focal_linux-kvm: needs-triage
112jammy_linux-kvm: needs-triage
113kinetic_linux-kvm: needs-triage
114devel_linux-kvm: needs-triage
115
116Patches_linux-aws:
117upstream_linux-aws: needs-triage
118esm-infra/xenial_linux-aws: needs-triage
119trusty_linux-aws: ignored (out of standard support)
120xenial_linux-aws: ignored (end of standard support)
121bionic_linux-aws: needs-triage
122focal_linux-aws: needs-triage
123jammy_linux-aws: needs-triage
124kinetic_linux-aws: needs-triage
125trusty/esm_linux-aws: needs-triage
126devel_linux-aws: needs-triage
127
128Patches_linux-aws-5.0:
129upstream_linux-aws-5.0: needs-triage
130trusty_linux-aws-5.0: DNE
131xenial_linux-aws-5.0: DNE
132bionic_linux-aws-5.0: ignored (superseded by linux-aws-5.3)
133focal_linux-aws-5.0: DNE
134jammy_linux-aws-5.0: DNE
135kinetic_linux-aws-5.0: DNE
136
137Patches_linux-aws-5.3:
138upstream_linux-aws-5.3: ignored (superseded by linux-aws-5.4)
139trusty_linux-aws-5.3: DNE
140xenial_linux-aws-5.3: DNE
141bionic_linux-aws-5.3: ignored (superseded by linux-aws-5.4)
142focal_linux-aws-5.3: DNE
143jammy_linux-aws-5.3: DNE
144kinetic_linux-aws-5.3: DNE
145
146Patches_linux-aws-5.4:
147upstream_linux-aws-5.4: needs-triage
148trusty_linux-aws-5.4: DNE
149xenial_linux-aws-5.4: DNE
150bionic_linux-aws-5.4: needs-triage
151focal_linux-aws-5.4: DNE
152jammy_linux-aws-5.4: DNE
153kinetic_linux-aws-5.4: DNE
154
155Patches_linux-aws-5.8:
156upstream_linux-aws-5.8: ignored (superseded by linux-aws-5.11)
157trusty_linux-aws-5.8: DNE
158xenial_linux-aws-5.8: DNE
159bionic_linux-aws-5.8: DNE
160focal_linux-aws-5.8: ignored (superseded by linux-aws-5.11)
161jammy_linux-aws-5.8: DNE
162kinetic_linux-aws-5.8: DNE
163
164Patches_linux-aws-5.11:
165upstream_linux-aws-5.11: ignored (superseded by linux-aws-5.13)
166trusty_linux-aws-5.11: DNE
167xenial_linux-aws-5.11: DNE
168bionic_linux-aws-5.11: DNE
169focal_linux-aws-5.11: ignored (superseded by linux-aws-5.13)
170jammy_linux-aws-5.11: DNE
171kinetic_linux-aws-5.11: DNE
172
173Patches_linux-aws-5.13:
174upstream_linux-aws-5.13: ignored (superseded by linux-aws-5.15)
175trusty_linux-aws-5.13: DNE
176xenial_linux-aws-5.13: DNE
177bionic_linux-aws-5.13: DNE
178focal_linux-aws-5.13: ignored (superseded by linux-aws-5.15)
179jammy_linux-aws-5.13: DNE
180kinetic_linux-aws-5.13: DNE
181
182Patches_linux-aws-5.15:
183upstream_linux-aws-5.15: needs-triage
184trusty_linux-aws-5.15: DNE
185xenial_linux-aws-5.15: DNE
186bionic_linux-aws-5.15: DNE
187focal_linux-aws-5.15: needs-triage
188jammy_linux-aws-5.15: DNE
189kinetic_linux-aws-5.15: DNE
190
191Patches_linux-aws-hwe:
192upstream_linux-aws-hwe: needs-triage
193esm-infra/xenial_linux-aws-hwe: needs-triage
194trusty_linux-aws-hwe: DNE
195xenial_linux-aws-hwe: ignored (end of standard support)
196bionic_linux-aws-hwe: DNE
197focal_linux-aws-hwe: DNE
198jammy_linux-aws-hwe: DNE
199kinetic_linux-aws-hwe: DNE
200
201Patches_linux-azure:
202upstream_linux-azure: needs-triage
203esm-infra/xenial_linux-azure: needs-triage
204trusty_linux-azure: ignored (out of standard support)
205xenial_linux-azure: ignored (end of standard support)
206bionic_linux-azure: ignored (superseded by linux-azure-5.3)
207focal_linux-azure: needs-triage
208jammy_linux-azure: needs-triage
209kinetic_linux-azure: needs-triage
210trusty/esm_linux-azure: needs-triage
211devel_linux-azure: needs-triage
212
213Patches_linux-azure-4.15:
214upstream_linux-azure-4.15: needs-triage
215trusty_linux-azure-4.15: DNE
216xenial_linux-azure-4.15: DNE
217bionic_linux-azure-4.15: needs-triage
218focal_linux-azure-4.15: DNE
219jammy_linux-azure-4.15: DNE
220kinetic_linux-azure-4.15: DNE
221
222Patches_linux-azure-5.3:
223upstream_linux-azure-5.3: ignored (superseded by linux-azure-5.4)
224trusty_linux-azure-5.3: DNE
225xenial_linux-azure-5.3: DNE
226bionic_linux-azure-5.3: ignored (superseded by linux-azure-5.4)
227focal_linux-azure-5.3: DNE
228jammy_linux-azure-5.3: DNE
229kinetic_linux-azure-5.3: DNE
230
231Patches_linux-azure-5.4:
232upstream_linux-azure-5.4: needs-triage
233trusty_linux-azure-5.4: DNE
234xenial_linux-azure-5.4: DNE
235bionic_linux-azure-5.4: needs-triage
236focal_linux-azure-5.4: DNE
237jammy_linux-azure-5.4: DNE
238kinetic_linux-azure-5.4: DNE
239
240Patches_linux-azure-5.8:
241upstream_linux-azure-5.8: ignored (superseded by linux-azure-5.11)
242trusty_linux-azure-5.8: DNE
243xenial_linux-azure-5.8: DNE
244bionic_linux-azure-5.8: DNE
245focal_linux-azure-5.8: ignored (superseded by linux-azure-5.11)
246jammy_linux-azure-5.8: DNE
247kinetic_linux-azure-5.8: DNE
248
249Patches_linux-azure-5.11:
250upstream_linux-azure-5.11: ignored (superseded by linux-azure-5.13)
251trusty_linux-azure-5.11: DNE
252xenial_linux-azure-5.11: DNE
253bionic_linux-azure-5.11: DNE
254focal_linux-azure-5.11: ignored (superseded by linux-azure-5.13)
255jammy_linux-azure-5.11: DNE
256kinetic_linux-azure-5.11: DNE
257
258Patches_linux-azure-5.13:
259upstream_linux-azure-5.13: ignored (superseded by linux-azure-5.15)
260trusty_linux-azure-5.13: DNE
261xenial_linux-azure-5.13: DNE
262bionic_linux-azure-5.13: DNE
263focal_linux-azure-5.13: ignored (superseded by linux-azure-5.15)
264jammy_linux-azure-5.13: DNE
265kinetic_linux-azure-5.13: DNE
266
267Patches_linux-azure-5.15:
268upstream_linux-azure-5.15: needs-triage
269trusty_linux-azure-5.15: DNE
270xenial_linux-azure-5.15: DNE
271bionic_linux-azure-5.15: DNE
272focal_linux-azure-5.15: needs-triage
273jammy_linux-azure-5.15: DNE
274kinetic_linux-azure-5.15: DNE
275
276Patches_linux-azure-fde:
277upstream_linux-azure-fde: needs-triage
278trusty_linux-azure-fde: DNE
279xenial_linux-azure-fde: DNE
280bionic_linux-azure-fde: DNE
281focal_linux-azure-fde: needs-triage
282jammy_linux-azure-fde: needs-triage
283kinetic_linux-azure-fde: DNE
284
285Patches_linux-azure-fde-5.15:
286upstream_linux-azure-fde-5.15: needs-triage
287trusty_linux-azure-fde-5.15: DNE
288xenial_linux-azure-fde-5.15: DNE
289bionic_linux-azure-fde-5.15: DNE
290focal_linux-azure-fde-5.15: needs-triage
291jammy_linux-azure-fde-5.15: DNE
292kinetic_linux-azure-fde-5.15: DNE
293
294Patches_linux-bluefield:
295upstream_linux-bluefield: needs-triage
296trusty_linux-bluefield: DNE
297xenial_linux-bluefield: DNE
298bionic_linux-bluefield: DNE
299focal_linux-bluefield: needs-triage
300jammy_linux-bluefield: DNE
301kinetic_linux-bluefield: DNE
302
303Patches_linux-dell300x:
304upstream_linux-dell300x: needs-triage
305trusty_linux-dell300x: DNE
306xenial_linux-dell300x: DNE
307bionic_linux-dell300x: needs-triage
308focal_linux-dell300x: DNE
309jammy_linux-dell300x: DNE
310kinetic_linux-dell300x: DNE
311
312Patches_linux-azure-edge:
313upstream_linux-azure-edge: needs-triage
314trusty_linux-azure-edge: DNE
315xenial_linux-azure-edge: DNE
316bionic_linux-azure-edge: ignored (superseded by linux-azure-5.3)
317focal_linux-azure-edge: DNE
318jammy_linux-azure-edge: DNE
319kinetic_linux-azure-edge: DNE
320
321Patches_linux-fips:
322upstream_linux-fips: needs-triage
323trusty_linux-fips: ignored (out of standard support)
324xenial_linux-fips: ignored (out of standard support)
325bionic_linux-fips: DNE
326focal_linux-fips: DNE
327jammy_linux-fips: DNE
328kinetic_linux-fips: DNE
329fips/xenial_linux-fips: needs-triage
330fips/bionic_linux-fips: needs-triage
331fips/focal_linux-fips: needs-triage
332fips-updates/xenial_linux-fips: needs-triage
333fips-updates/bionic_linux-fips: needs-triage
334fips-updates/focal_linux-fips: needs-triage
335
336Patches_linux-gcp:
337upstream_linux-gcp: needs-triage
338esm-infra/xenial_linux-gcp: needs-triage
339trusty_linux-gcp: DNE
340xenial_linux-gcp: ignored (end of standard support)
341bionic_linux-gcp: ignored (superseded by linux-gcp-5.3)
342focal_linux-gcp: needs-triage
343jammy_linux-gcp: needs-triage
344kinetic_linux-gcp: needs-triage
345devel_linux-gcp: needs-triage
346
347Patches_linux-gcp-4.15:
348upstream_linux-gcp-4.15: needs-triage
349trusty_linux-gcp-4.15: DNE
350xenial_linux-gcp-4.15: DNE
351bionic_linux-gcp-4.15: needs-triage
352focal_linux-gcp-4.15: DNE
353jammy_linux-gcp-4.15: DNE
354kinetic_linux-gcp-4.15: DNE
355
356Patches_linux-gcp-5.3:
357upstream_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4)
358trusty_linux-gcp-5.3: DNE
359xenial_linux-gcp-5.3: DNE
360bionic_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4)
361focal_linux-gcp-5.3: DNE
362jammy_linux-gcp-5.3: DNE
363kinetic_linux-gcp-5.3: DNE
364
365Patches_linux-gcp-5.4:
366upstream_linux-gcp-5.4: needs-triage
367trusty_linux-gcp-5.4: DNE
368xenial_linux-gcp-5.4: DNE
369bionic_linux-gcp-5.4: needs-triage
370focal_linux-gcp-5.4: DNE
371jammy_linux-gcp-5.4: DNE
372kinetic_linux-gcp-5.4: DNE
373
374Patches_linux-gcp-5.8:
375upstream_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11)
376trusty_linux-gcp-5.8: DNE
377xenial_linux-gcp-5.8: DNE
378bionic_linux-gcp-5.8: DNE
379focal_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11)
380jammy_linux-gcp-5.8: DNE
381kinetic_linux-gcp-5.8: DNE
382
383Patches_linux-gcp-5.11:
384upstream_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13)
385trusty_linux-gcp-5.11: DNE
386xenial_linux-gcp-5.11: DNE
387bionic_linux-gcp-5.11: DNE
388focal_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13)
389jammy_linux-gcp-5.11: DNE
390kinetic_linux-gcp-5.11: DNE
391
392Patches_linux-gcp-5.13:
393upstream_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15)
394trusty_linux-gcp-5.13: DNE
395xenial_linux-gcp-5.13: DNE
396bionic_linux-gcp-5.13: DNE
397focal_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15)
398jammy_linux-gcp-5.13: DNE
399kinetic_linux-gcp-5.13: DNE
400
401Patches_linux-gcp-5.15:
402upstream_linux-gcp-5.15: needs-triage
403trusty_linux-gcp-5.15: DNE
404xenial_linux-gcp-5.15: DNE
405bionic_linux-gcp-5.15: DNE
406focal_linux-gcp-5.15: needs-triage
407jammy_linux-gcp-5.15: DNE
408kinetic_linux-gcp-5.15: DNE
409
410Patches_linux-gke:
411upstream_linux-gke: needs-triage
412trusty_linux-gke: DNE
413xenial_linux-gke: ignored (reached end of standard support)
414bionic_linux-gke: DNE
415focal_linux-gke: needs-triage
416jammy_linux-gke: needs-triage
417kinetic_linux-gke: DNE
418
419Patches_linux-gke-4.15:
420upstream_linux-gke-4.15: needs-triage
421trusty_linux-gke-4.15: DNE
422xenial_linux-gke-4.15: DNE
423bionic_linux-gke-4.15: needs-triage
424focal_linux-gke-4.15: DNE
425jammy_linux-gke-4.15: DNE
426kinetic_linux-gke-4.15: DNE
427
428Patches_linux-gke-5.0:
429upstream_linux-gke-5.0: needs-triage
430trusty_linux-gke-5.0: DNE
431xenial_linux-gke-5.0: DNE
432bionic_linux-gke-5.0: ignored (superseded by linux-gke-5.3)
433focal_linux-gke-5.0: DNE
434jammy_linux-gke-5.0: DNE
435kinetic_linux-gke-5.0: DNE
436
437Patches_linux-gke-5.3:
438upstream_linux-gke-5.3: ignored (superseded by linux-gke-5.4)
439trusty_linux-gke-5.3: DNE
440xenial_linux-gke-5.3: DNE
441bionic_linux-gke-5.3: ignored (superseded by linux-gke-5.4)
442focal_linux-gke-5.3: DNE
443jammy_linux-gke-5.3: DNE
444kinetic_linux-gke-5.3: DNE
445
446Patches_linux-gke-5.4:
447upstream_linux-gke-5.4: needs-triage
448trusty_linux-gke-5.4: DNE
449xenial_linux-gke-5.4: DNE
450bionic_linux-gke-5.4: needs-triage
451focal_linux-gke-5.4: DNE
452jammy_linux-gke-5.4: DNE
453kinetic_linux-gke-5.4: DNE
454
455Patches_linux-gke-5.15:
456upstream_linux-gke-5.15: needs-triage
457trusty_linux-gke-5.15: DNE
458xenial_linux-gke-5.15: DNE
459bionic_linux-gke-5.15: DNE
460focal_linux-gke-5.15: needs-triage
461jammy_linux-gke-5.15: DNE
462kinetic_linux-gke-5.15: DNE
463
464Patches_linux-gkeop:
465upstream_linux-gkeop: needs-triage
466trusty_linux-gkeop: DNE
467xenial_linux-gkeop: DNE
468bionic_linux-gkeop: DNE
469focal_linux-gkeop: needs-triage
470jammy_linux-gkeop: needs-triage
471kinetic_linux-gkeop: DNE
472
473Patches_linux-gkeop-5.4:
474upstream_linux-gkeop-5.4: needs-triage
475trusty_linux-gkeop-5.4: DNE
476xenial_linux-gkeop-5.4: DNE
477bionic_linux-gkeop-5.4: needs-triage
478focal_linux-gkeop-5.4: DNE
479jammy_linux-gkeop-5.4: DNE
480kinetic_linux-gkeop-5.4: DNE
481
482Patches_linux-ibm:
483upstream_linux-ibm: needs-triage
484trusty_linux-ibm: DNE
485xenial_linux-ibm: DNE
486bionic_linux-ibm: DNE
487focal_linux-ibm: needs-triage
488jammy_linux-ibm: needs-triage
489kinetic_linux-ibm: needs-triage
490devel_linux-ibm: needs-triage
491
492Patches_linux-ibm-5.4:
493upstream_linux-ibm-5.4: needs-triage
494trusty_linux-ibm-5.4: DNE
495xenial_linux-ibm-5.4: DNE
496bionic_linux-ibm-5.4: needs-triage
497focal_linux-ibm-5.4: DNE
498jammy_linux-ibm-5.4: DNE
499kinetic_linux-ibm-5.4: DNE
500
501Patches_linux-intel-5.13:
502upstream_linux-intel-5.13: needs-triage
503trusty_linux-intel-5.13: DNE
504xenial_linux-intel-5.13: DNE
505bionic_linux-intel-5.13: DNE
506focal_linux-intel-5.13: needs-triage
507jammy_linux-intel-5.13: DNE
508kinetic_linux-intel-5.13: DNE
509
510Patches_linux-intel-iotg:
511upstream_linux-intel-iotg: needs-triage
512trusty_linux-intel-iotg: DNE
513xenial_linux-intel-iotg: DNE
514bionic_linux-intel-iotg: DNE
515focal_linux-intel-iotg: DNE
516jammy_linux-intel-iotg: needs-triage
517kinetic_linux-intel-iotg: DNE
518
519Patches_linux-intel-iotg-5.15:
520upstream_linux-intel-iotg-5.15: needs-triage
521trusty_linux-intel-iotg-5.15: DNE
522xenial_linux-intel-iotg-5.15: DNE
523bionic_linux-intel-iotg-5.15: DNE
524focal_linux-intel-iotg-5.15: needs-triage
525jammy_linux-intel-iotg-5.15: DNE
526kinetic_linux-intel-iotg-5.15: DNE
527
528Patches_linux-lowlatency:
529upstream_linux-lowlatency: needs-triage
530trusty_linux-lowlatency: DNE
531xenial_linux-lowlatency: DNE
532bionic_linux-lowlatency: DNE
533focal_linux-lowlatency: DNE
534jammy_linux-lowlatency: needs-triage
535kinetic_linux-lowlatency: needs-triage
536devel_linux-lowlatency: needs-triage
537
538Patches_linux-lowlatency-hwe-5.15:
539upstream_linux-lowlatency-hwe-5.15: needs-triage
540trusty_linux-lowlatency-hwe-5.15: DNE
541xenial_linux-lowlatency-hwe-5.15: DNE
542bionic_linux-lowlatency-hwe-5.15: DNE
543focal_linux-lowlatency-hwe-5.15: needs-triage
544jammy_linux-lowlatency-hwe-5.15: DNE
545kinetic_linux-lowlatency-hwe-5.15: DNE
546
547Patches_linux-oracle:
548upstream_linux-oracle: needs-triage
549esm-infra/xenial_linux-oracle: needs-triage
550trusty_linux-oracle: DNE
551xenial_linux-oracle: ignored (end of standard support)
552bionic_linux-oracle: needs-triage
553focal_linux-oracle: needs-triage
554jammy_linux-oracle: needs-triage
555kinetic_linux-oracle: needs-triage
556devel_linux-oracle: needs-triage
557
558Patches_linux-oracle-5.0:
559upstream_linux-oracle-5.0: needs-triage
560trusty_linux-oracle-5.0: DNE
561xenial_linux-oracle-5.0: DNE
562bionic_linux-oracle-5.0: ignored (superseded by linux-oracle-5.3)
563focal_linux-oracle-5.0: DNE
564jammy_linux-oracle-5.0: DNE
565kinetic_linux-oracle-5.0: DNE
566
567Patches_linux-oracle-5.3:
568upstream_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4)
569trusty_linux-oracle-5.3: DNE
570xenial_linux-oracle-5.3: DNE
571bionic_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4)
572focal_linux-oracle-5.3: DNE
573jammy_linux-oracle-5.3: DNE
574kinetic_linux-oracle-5.3: DNE
575
576Patches_linux-oracle-5.4:
577upstream_linux-oracle-5.4: needs-triage
578trusty_linux-oracle-5.4: DNE
579xenial_linux-oracle-5.4: DNE
580bionic_linux-oracle-5.4: needs-triage
581focal_linux-oracle-5.4: DNE
582jammy_linux-oracle-5.4: DNE
583kinetic_linux-oracle-5.4: DNE
584
585Patches_linux-oracle-5.8:
586upstream_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11)
587trusty_linux-oracle-5.8: DNE
588xenial_linux-oracle-5.8: DNE
589bionic_linux-oracle-5.8: DNE
590focal_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11)
591jammy_linux-oracle-5.8: DNE
592kinetic_linux-oracle-5.8: DNE
593
594Patches_linux-oracle-5.11:
595upstream_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13)
596trusty_linux-oracle-5.11: DNE
597xenial_linux-oracle-5.11: DNE
598bionic_linux-oracle-5.11: DNE
599focal_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13)
600jammy_linux-oracle-5.11: DNE
601kinetic_linux-oracle-5.11: DNE
602
603Patches_linux-oracle-5.13:
604upstream_linux-oracle-5.13: needs-triage
605trusty_linux-oracle-5.13: DNE
606xenial_linux-oracle-5.13: DNE
607bionic_linux-oracle-5.13: DNE
608focal_linux-oracle-5.13: needs-triage
609jammy_linux-oracle-5.13: DNE
610kinetic_linux-oracle-5.13: DNE
611
612Patches_linux-oracle-5.15:
613upstream_linux-oracle-5.15: needs-triage
614trusty_linux-oracle-5.15: DNE
615xenial_linux-oracle-5.15: DNE
616bionic_linux-oracle-5.15: DNE
617focal_linux-oracle-5.15: needs-triage
618jammy_linux-oracle-5.15: DNE
619kinetic_linux-oracle-5.15: DNE
620
621Patches_linux-oem:
622upstream_linux-oem: needs-triage
623trusty_linux-oem: DNE
624xenial_linux-oem: ignored (superseded by linux-hwe)
625bionic_linux-oem: needs-triage
626focal_linux-oem: DNE
627jammy_linux-oem: DNE
628kinetic_linux-oem: DNE
629
630Patches_linux-oem-5.6:
631upstream_linux-oem-5.6: needs-triage
632trusty_linux-oem-5.6: DNE
633xenial_linux-oem-5.6: DNE
634bionic_linux-oem-5.6: DNE
635focal_linux-oem-5.6: needs-triage
636jammy_linux-oem-5.6: DNE
637kinetic_linux-oem-5.6: DNE
638
639Patches_linux-oem-5.10:
640upstream_linux-oem-5.10: needs-triage
641trusty_linux-oem-5.10: DNE
642xenial_linux-oem-5.10: DNE
643bionic_linux-oem-5.10: DNE
644focal_linux-oem-5.10: needs-triage
645jammy_linux-oem-5.10: DNE
646kinetic_linux-oem-5.10: DNE
647
648Patches_linux-oem-5.13:
649upstream_linux-oem-5.13: ignored (superseded by linux-oem-5.14)
650trusty_linux-oem-5.13: DNE
651xenial_linux-oem-5.13: DNE
652bionic_linux-oem-5.13: DNE
653focal_linux-oem-5.13: ignored (superseded by linux-oem-5.14)
654jammy_linux-oem-5.13: DNE
655kinetic_linux-oem-5.13: DNE
656
657Patches_linux-oem-5.14:
658upstream_linux-oem-5.14: needs-triage
659trusty_linux-oem-5.14: DNE
660xenial_linux-oem-5.14: DNE
661bionic_linux-oem-5.14: DNE
662focal_linux-oem-5.14: needs-triage
663jammy_linux-oem-5.14: DNE
664kinetic_linux-oem-5.14: DNE
665
666Patches_linux-oem-5.17:
667upstream_linux-oem-5.17: needs-triage
668trusty_linux-oem-5.17: DNE
669xenial_linux-oem-5.17: DNE
670bionic_linux-oem-5.17: DNE
671focal_linux-oem-5.17: DNE
672jammy_linux-oem-5.17: needs-triage
673kinetic_linux-oem-5.17: needs-triage
674devel_linux-oem-5.17: needs-triage
675
676Patches_linux-oem-osp1:
677upstream_linux-oem-osp1: needs-triage
678trusty_linux-oem-osp1: DNE
679xenial_linux-oem-osp1: DNE
680bionic_linux-oem-osp1: needs-triage
681focal_linux-oem-osp1: DNE
682jammy_linux-oem-osp1: DNE
683kinetic_linux-oem-osp1: DNE
684
685Patches_linux-raspi:
686upstream_linux-raspi: needs-triage
687trusty_linux-raspi: DNE
688xenial_linux-raspi: DNE
689bionic_linux-raspi: DNE
690focal_linux-raspi: needs-triage
691jammy_linux-raspi: needs-triage
692kinetic_linux-raspi: needs-triage
693devel_linux-raspi: needs-triage
694
695Patches_linux-raspi2:
696upstream_linux-raspi2: needs-triage
697trusty_linux-raspi2: DNE
698xenial_linux-raspi2: ignored (end of standard support)
699bionic_linux-raspi2: needs-triage
700focal_linux-raspi2: ignored (replaced by linux-raspi)
701jammy_linux-raspi2: DNE
702kinetic_linux-raspi2: DNE
703
704Patches_linux-raspi2-5.3:
705upstream_linux-raspi2-5.3: ignored (superseded by linux-raspi2-5.4)
706trusty_linux-raspi2-5.3: DNE
707xenial_linux-raspi2-5.3: DNE
708bionic_linux-raspi2-5.3: ignored (superseded by linux-raspi-5.4)
709focal_linux-raspi2-5.3: DNE
710jammy_linux-raspi2-5.3: DNE
711kinetic_linux-raspi2-5.3: DNE
712
713Patches_linux-raspi-5.4:
714upstream_linux-raspi-5.4: needs-triage
715trusty_linux-raspi-5.4: DNE
716xenial_linux-raspi-5.4: DNE
717bionic_linux-raspi-5.4: needs-triage
718focal_linux-raspi-5.4: DNE
719jammy_linux-raspi-5.4: DNE
720kinetic_linux-raspi-5.4: DNE
721
722Patches_linux-riscv:
723upstream_linux-riscv: needs-triage
724trusty_linux-riscv: DNE
725xenial_linux-riscv: DNE
726bionic_linux-riscv: DNE
727focal_linux-riscv: ignored (superseded by linux-riscv-5.8)
728jammy_linux-riscv: needs-triage
729kinetic_linux-riscv: needs-triage
730devel_linux-riscv: needs-triage
731
732Patches_linux-riscv-5.8:
733upstream_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11)
734trusty_linux-riscv-5.8: DNE
735xenial_linux-riscv-5.8: DNE
736bionic_linux-riscv-5.8: DNE
737focal_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11)
738jammy_linux-riscv-5.8: DNE
739kinetic_linux-riscv-5.8: DNE
740
741Patches_linux-riscv-5.11:
742upstream_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13)
743trusty_linux-riscv-5.11: DNE
744xenial_linux-riscv-5.11: DNE
745bionic_linux-riscv-5.11: DNE
746focal_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13)
747jammy_linux-riscv-5.11: DNE
748kinetic_linux-riscv-5.11: DNE
749
750Patches_linux-snapdragon:
751upstream_linux-snapdragon: needs-triage
752trusty_linux-snapdragon: DNE
753xenial_linux-snapdragon: ignored (end of standard support)
754bionic_linux-snapdragon: needs-triage
755focal_linux-snapdragon: DNE
756jammy_linux-snapdragon: DNE
757kinetic_linux-snapdragon: DNE
diff --git a/active/CVE-2022-20566 b/active/CVE-2022-20566
0new file mode 100644758new file mode 100644
index 0000000..5228ae3
--- /dev/null
+++ b/active/CVE-2022-20566
@@ -0,0 +1,757 @@
1Candidate: CVE-2022-20566
2PublicDate: 2022-12-06
3References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20566
5 https://git.kernel.org/linus/d0be8347c623e0ac4202a1d4e0373882821f56b0
6Description:
7 [Unknown description]
8Ubuntu-Description:
9Notes:
10Mitigation:
11Bugs:
12Priority: medium
13Discovered-by:
14Assigned-to:
15CVSS:
16
17Patches_linux:
18 break-fix: - d0be8347c623e0ac4202a1d4e0373882821f56b0
19upstream_linux: released (5.18.16-1)
20esm-infra/xenial_linux: needs-triage
21trusty_linux: ignored (out of standard support)
22xenial_linux: ignored (out of standard support)
23bionic_linux: needs-triage
24focal_linux: needs-triage
25jammy_linux: needs-triage
26kinetic_linux: not-affected (5.19.0-26.27)
27trusty/esm_linux: not-affected
28devel_linux: not-affected
29
30Patches_linux-hwe:
31upstream_linux-hwe: needs-triage
32esm-infra/xenial_linux-hwe: needs-triage
33trusty_linux-hwe: DNE
34xenial_linux-hwe: ignored (end of standard support)
35bionic_linux-hwe: ignored (replaced by linux-hwe-5.4)
36focal_linux-hwe: DNE
37jammy_linux-hwe: DNE
38kinetic_linux-hwe: DNE
39
40Patches_linux-hwe-5.4:
41upstream_linux-hwe-5.4: needs-triage
42trusty_linux-hwe-5.4: DNE
43xenial_linux-hwe-5.4: DNE
44bionic_linux-hwe-5.4: needs-triage
45focal_linux-hwe-5.4: DNE
46jammy_linux-hwe-5.4: DNE
47kinetic_linux-hwe-5.4: DNE
48
49Patches_linux-hwe-5.8:
50upstream_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11)
51trusty_linux-hwe-5.8: DNE
52xenial_linux-hwe-5.8: DNE
53bionic_linux-hwe-5.8: DNE
54focal_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11)
55jammy_linux-hwe-5.8: DNE
56kinetic_linux-hwe-5.8: DNE
57
58Patches_linux-hwe-5.11:
59upstream_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13)
60trusty_linux-hwe-5.11: DNE
61xenial_linux-hwe-5.11: DNE
62bionic_linux-hwe-5.11: DNE
63focal_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13)
64jammy_linux-hwe-5.11: DNE
65kinetic_linux-hwe-5.11: DNE
66
67Patches_linux-hwe-5.13:
68upstream_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15)
69trusty_linux-hwe-5.13: DNE
70xenial_linux-hwe-5.13: DNE
71bionic_linux-hwe-5.13: DNE
72focal_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15)
73jammy_linux-hwe-5.13: DNE
74kinetic_linux-hwe-5.13: DNE
75
76Patches_linux-hwe-5.15:
77upstream_linux-hwe-5.15: needs-triage
78trusty_linux-hwe-5.15: DNE
79xenial_linux-hwe-5.15: DNE
80bionic_linux-hwe-5.15: DNE
81focal_linux-hwe-5.15: needs-triage
82jammy_linux-hwe-5.15: DNE
83kinetic_linux-hwe-5.15: DNE
84
85Patches_linux-hwe-edge:
86upstream_linux-hwe-edge: needs-triage
87esm-infra/xenial_linux-hwe-edge: ignored (superseded by linux-hwe)
88trusty_linux-hwe-edge: DNE
89xenial_linux-hwe-edge: ignored (superseded by linux-hwe)
90bionic_linux-hwe-edge: ignored (superseded by linux-hwe-5.4)
91focal_linux-hwe-edge: DNE
92jammy_linux-hwe-edge: DNE
93kinetic_linux-hwe-edge: DNE
94
95Patches_linux-lts-xenial:
96upstream_linux-lts-xenial: needs-triage
97trusty_linux-lts-xenial: ignored (out of standard support)
98xenial_linux-lts-xenial: DNE
99bionic_linux-lts-xenial: DNE
100focal_linux-lts-xenial: DNE
101jammy_linux-lts-xenial: DNE
102kinetic_linux-lts-xenial: DNE
103trusty/esm_linux-lts-xenial: needs-triage
104
105Patches_linux-kvm:
106upstream_linux-kvm: needs-triage
107esm-infra/xenial_linux-kvm: needs-triage
108trusty_linux-kvm: DNE
109xenial_linux-kvm: ignored (end of standard support)
110bionic_linux-kvm: needs-triage
111focal_linux-kvm: needs-triage
112jammy_linux-kvm: needs-triage
113kinetic_linux-kvm: needs-triage
114devel_linux-kvm: needs-triage
115
116Patches_linux-aws:
117upstream_linux-aws: needs-triage
118esm-infra/xenial_linux-aws: needs-triage
119trusty_linux-aws: ignored (out of standard support)
120xenial_linux-aws: ignored (end of standard support)
121bionic_linux-aws: needs-triage
122focal_linux-aws: needs-triage
123jammy_linux-aws: needs-triage
124kinetic_linux-aws: needs-triage
125trusty/esm_linux-aws: needs-triage
126devel_linux-aws: needs-triage
127
128Patches_linux-aws-5.0:
129upstream_linux-aws-5.0: needs-triage
130trusty_linux-aws-5.0: DNE
131xenial_linux-aws-5.0: DNE
132bionic_linux-aws-5.0: ignored (superseded by linux-aws-5.3)
133focal_linux-aws-5.0: DNE
134jammy_linux-aws-5.0: DNE
135kinetic_linux-aws-5.0: DNE
136
137Patches_linux-aws-5.3:
138upstream_linux-aws-5.3: ignored (superseded by linux-aws-5.4)
139trusty_linux-aws-5.3: DNE
140xenial_linux-aws-5.3: DNE
141bionic_linux-aws-5.3: ignored (superseded by linux-aws-5.4)
142focal_linux-aws-5.3: DNE
143jammy_linux-aws-5.3: DNE
144kinetic_linux-aws-5.3: DNE
145
146Patches_linux-aws-5.4:
147upstream_linux-aws-5.4: needs-triage
148trusty_linux-aws-5.4: DNE
149xenial_linux-aws-5.4: DNE
150bionic_linux-aws-5.4: needs-triage
151focal_linux-aws-5.4: DNE
152jammy_linux-aws-5.4: DNE
153kinetic_linux-aws-5.4: DNE
154
155Patches_linux-aws-5.8:
156upstream_linux-aws-5.8: ignored (superseded by linux-aws-5.11)
157trusty_linux-aws-5.8: DNE
158xenial_linux-aws-5.8: DNE
159bionic_linux-aws-5.8: DNE
160focal_linux-aws-5.8: ignored (superseded by linux-aws-5.11)
161jammy_linux-aws-5.8: DNE
162kinetic_linux-aws-5.8: DNE
163
164Patches_linux-aws-5.11:
165upstream_linux-aws-5.11: ignored (superseded by linux-aws-5.13)
166trusty_linux-aws-5.11: DNE
167xenial_linux-aws-5.11: DNE
168bionic_linux-aws-5.11: DNE
169focal_linux-aws-5.11: ignored (superseded by linux-aws-5.13)
170jammy_linux-aws-5.11: DNE
171kinetic_linux-aws-5.11: DNE
172
173Patches_linux-aws-5.13:
174upstream_linux-aws-5.13: ignored (superseded by linux-aws-5.15)
175trusty_linux-aws-5.13: DNE
176xenial_linux-aws-5.13: DNE
177bionic_linux-aws-5.13: DNE
178focal_linux-aws-5.13: ignored (superseded by linux-aws-5.15)
179jammy_linux-aws-5.13: DNE
180kinetic_linux-aws-5.13: DNE
181
182Patches_linux-aws-5.15:
183upstream_linux-aws-5.15: needs-triage
184trusty_linux-aws-5.15: DNE
185xenial_linux-aws-5.15: DNE
186bionic_linux-aws-5.15: DNE
187focal_linux-aws-5.15: needs-triage
188jammy_linux-aws-5.15: DNE
189kinetic_linux-aws-5.15: DNE
190
191Patches_linux-aws-hwe:
192upstream_linux-aws-hwe: needs-triage
193esm-infra/xenial_linux-aws-hwe: needs-triage
194trusty_linux-aws-hwe: DNE
195xenial_linux-aws-hwe: ignored (end of standard support)
196bionic_linux-aws-hwe: DNE
197focal_linux-aws-hwe: DNE
198jammy_linux-aws-hwe: DNE
199kinetic_linux-aws-hwe: DNE
200
201Patches_linux-azure:
202upstream_linux-azure: needs-triage
203esm-infra/xenial_linux-azure: needs-triage
204trusty_linux-azure: ignored (out of standard support)
205xenial_linux-azure: ignored (end of standard support)
206bionic_linux-azure: ignored (superseded by linux-azure-5.3)
207focal_linux-azure: needs-triage
208jammy_linux-azure: needs-triage
209kinetic_linux-azure: needs-triage
210trusty/esm_linux-azure: needs-triage
211devel_linux-azure: needs-triage
212
213Patches_linux-azure-4.15:
214upstream_linux-azure-4.15: needs-triage
215trusty_linux-azure-4.15: DNE
216xenial_linux-azure-4.15: DNE
217bionic_linux-azure-4.15: needs-triage
218focal_linux-azure-4.15: DNE
219jammy_linux-azure-4.15: DNE
220kinetic_linux-azure-4.15: DNE
221
222Patches_linux-azure-5.3:
223upstream_linux-azure-5.3: ignored (superseded by linux-azure-5.4)
224trusty_linux-azure-5.3: DNE
225xenial_linux-azure-5.3: DNE
226bionic_linux-azure-5.3: ignored (superseded by linux-azure-5.4)
227focal_linux-azure-5.3: DNE
228jammy_linux-azure-5.3: DNE
229kinetic_linux-azure-5.3: DNE
230
231Patches_linux-azure-5.4:
232upstream_linux-azure-5.4: needs-triage
233trusty_linux-azure-5.4: DNE
234xenial_linux-azure-5.4: DNE
235bionic_linux-azure-5.4: needs-triage
236focal_linux-azure-5.4: DNE
237jammy_linux-azure-5.4: DNE
238kinetic_linux-azure-5.4: DNE
239
240Patches_linux-azure-5.8:
241upstream_linux-azure-5.8: ignored (superseded by linux-azure-5.11)
242trusty_linux-azure-5.8: DNE
243xenial_linux-azure-5.8: DNE
244bionic_linux-azure-5.8: DNE
245focal_linux-azure-5.8: ignored (superseded by linux-azure-5.11)
246jammy_linux-azure-5.8: DNE
247kinetic_linux-azure-5.8: DNE
248
249Patches_linux-azure-5.11:
250upstream_linux-azure-5.11: ignored (superseded by linux-azure-5.13)
251trusty_linux-azure-5.11: DNE
252xenial_linux-azure-5.11: DNE
253bionic_linux-azure-5.11: DNE
254focal_linux-azure-5.11: ignored (superseded by linux-azure-5.13)
255jammy_linux-azure-5.11: DNE
256kinetic_linux-azure-5.11: DNE
257
258Patches_linux-azure-5.13:
259upstream_linux-azure-5.13: ignored (superseded by linux-azure-5.15)
260trusty_linux-azure-5.13: DNE
261xenial_linux-azure-5.13: DNE
262bionic_linux-azure-5.13: DNE
263focal_linux-azure-5.13: ignored (superseded by linux-azure-5.15)
264jammy_linux-azure-5.13: DNE
265kinetic_linux-azure-5.13: DNE
266
267Patches_linux-azure-5.15:
268upstream_linux-azure-5.15: needs-triage
269trusty_linux-azure-5.15: DNE
270xenial_linux-azure-5.15: DNE
271bionic_linux-azure-5.15: DNE
272focal_linux-azure-5.15: needs-triage
273jammy_linux-azure-5.15: DNE
274kinetic_linux-azure-5.15: DNE
275
276Patches_linux-azure-fde:
277upstream_linux-azure-fde: needs-triage
278trusty_linux-azure-fde: DNE
279xenial_linux-azure-fde: DNE
280bionic_linux-azure-fde: DNE
281focal_linux-azure-fde: needs-triage
282jammy_linux-azure-fde: needs-triage
283kinetic_linux-azure-fde: DNE
284
285Patches_linux-azure-fde-5.15:
286upstream_linux-azure-fde-5.15: needs-triage
287trusty_linux-azure-fde-5.15: DNE
288xenial_linux-azure-fde-5.15: DNE
289bionic_linux-azure-fde-5.15: DNE
290focal_linux-azure-fde-5.15: needs-triage
291jammy_linux-azure-fde-5.15: DNE
292kinetic_linux-azure-fde-5.15: DNE
293
294Patches_linux-bluefield:
295upstream_linux-bluefield: needs-triage
296trusty_linux-bluefield: DNE
297xenial_linux-bluefield: DNE
298bionic_linux-bluefield: DNE
299focal_linux-bluefield: needs-triage
300jammy_linux-bluefield: DNE
301kinetic_linux-bluefield: DNE
302
303Patches_linux-dell300x:
304upstream_linux-dell300x: needs-triage
305trusty_linux-dell300x: DNE
306xenial_linux-dell300x: DNE
307bionic_linux-dell300x: needs-triage
308focal_linux-dell300x: DNE
309jammy_linux-dell300x: DNE
310kinetic_linux-dell300x: DNE
311
312Patches_linux-azure-edge:
313upstream_linux-azure-edge: needs-triage
314trusty_linux-azure-edge: DNE
315xenial_linux-azure-edge: DNE
316bionic_linux-azure-edge: ignored (superseded by linux-azure-5.3)
317focal_linux-azure-edge: DNE
318jammy_linux-azure-edge: DNE
319kinetic_linux-azure-edge: DNE
320
321Patches_linux-fips:
322upstream_linux-fips: needs-triage
323trusty_linux-fips: ignored (out of standard support)
324xenial_linux-fips: ignored (out of standard support)
325bionic_linux-fips: DNE
326focal_linux-fips: DNE
327jammy_linux-fips: DNE
328kinetic_linux-fips: DNE
329fips/xenial_linux-fips: needs-triage
330fips/bionic_linux-fips: needs-triage
331fips/focal_linux-fips: needs-triage
332fips-updates/xenial_linux-fips: needs-triage
333fips-updates/bionic_linux-fips: needs-triage
334fips-updates/focal_linux-fips: needs-triage
335
336Patches_linux-gcp:
337upstream_linux-gcp: needs-triage
338esm-infra/xenial_linux-gcp: needs-triage
339trusty_linux-gcp: DNE
340xenial_linux-gcp: ignored (end of standard support)
341bionic_linux-gcp: ignored (superseded by linux-gcp-5.3)
342focal_linux-gcp: needs-triage
343jammy_linux-gcp: needs-triage
344kinetic_linux-gcp: needs-triage
345devel_linux-gcp: needs-triage
346
347Patches_linux-gcp-4.15:
348upstream_linux-gcp-4.15: needs-triage
349trusty_linux-gcp-4.15: DNE
350xenial_linux-gcp-4.15: DNE
351bionic_linux-gcp-4.15: needs-triage
352focal_linux-gcp-4.15: DNE
353jammy_linux-gcp-4.15: DNE
354kinetic_linux-gcp-4.15: DNE
355
356Patches_linux-gcp-5.3:
357upstream_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4)
358trusty_linux-gcp-5.3: DNE
359xenial_linux-gcp-5.3: DNE
360bionic_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4)
361focal_linux-gcp-5.3: DNE
362jammy_linux-gcp-5.3: DNE
363kinetic_linux-gcp-5.3: DNE
364
365Patches_linux-gcp-5.4:
366upstream_linux-gcp-5.4: needs-triage
367trusty_linux-gcp-5.4: DNE
368xenial_linux-gcp-5.4: DNE
369bionic_linux-gcp-5.4: needs-triage
370focal_linux-gcp-5.4: DNE
371jammy_linux-gcp-5.4: DNE
372kinetic_linux-gcp-5.4: DNE
373
374Patches_linux-gcp-5.8:
375upstream_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11)
376trusty_linux-gcp-5.8: DNE
377xenial_linux-gcp-5.8: DNE
378bionic_linux-gcp-5.8: DNE
379focal_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11)
380jammy_linux-gcp-5.8: DNE
381kinetic_linux-gcp-5.8: DNE
382
383Patches_linux-gcp-5.11:
384upstream_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13)
385trusty_linux-gcp-5.11: DNE
386xenial_linux-gcp-5.11: DNE
387bionic_linux-gcp-5.11: DNE
388focal_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13)
389jammy_linux-gcp-5.11: DNE
390kinetic_linux-gcp-5.11: DNE
391
392Patches_linux-gcp-5.13:
393upstream_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15)
394trusty_linux-gcp-5.13: DNE
395xenial_linux-gcp-5.13: DNE
396bionic_linux-gcp-5.13: DNE
397focal_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15)
398jammy_linux-gcp-5.13: DNE
399kinetic_linux-gcp-5.13: DNE
400
401Patches_linux-gcp-5.15:
402upstream_linux-gcp-5.15: needs-triage
403trusty_linux-gcp-5.15: DNE
404xenial_linux-gcp-5.15: DNE
405bionic_linux-gcp-5.15: DNE
406focal_linux-gcp-5.15: needs-triage
407jammy_linux-gcp-5.15: DNE
408kinetic_linux-gcp-5.15: DNE
409
410Patches_linux-gke:
411upstream_linux-gke: needs-triage
412trusty_linux-gke: DNE
413xenial_linux-gke: ignored (reached end of standard support)
414bionic_linux-gke: DNE
415focal_linux-gke: needs-triage
416jammy_linux-gke: needs-triage
417kinetic_linux-gke: DNE
418
419Patches_linux-gke-4.15:
420upstream_linux-gke-4.15: needs-triage
421trusty_linux-gke-4.15: DNE
422xenial_linux-gke-4.15: DNE
423bionic_linux-gke-4.15: needs-triage
424focal_linux-gke-4.15: DNE
425jammy_linux-gke-4.15: DNE
426kinetic_linux-gke-4.15: DNE
427
428Patches_linux-gke-5.0:
429upstream_linux-gke-5.0: needs-triage
430trusty_linux-gke-5.0: DNE
431xenial_linux-gke-5.0: DNE
432bionic_linux-gke-5.0: ignored (superseded by linux-gke-5.3)
433focal_linux-gke-5.0: DNE
434jammy_linux-gke-5.0: DNE
435kinetic_linux-gke-5.0: DNE
436
437Patches_linux-gke-5.3:
438upstream_linux-gke-5.3: ignored (superseded by linux-gke-5.4)
439trusty_linux-gke-5.3: DNE
440xenial_linux-gke-5.3: DNE
441bionic_linux-gke-5.3: ignored (superseded by linux-gke-5.4)
442focal_linux-gke-5.3: DNE
443jammy_linux-gke-5.3: DNE
444kinetic_linux-gke-5.3: DNE
445
446Patches_linux-gke-5.4:
447upstream_linux-gke-5.4: needs-triage
448trusty_linux-gke-5.4: DNE
449xenial_linux-gke-5.4: DNE
450bionic_linux-gke-5.4: needs-triage
451focal_linux-gke-5.4: DNE
452jammy_linux-gke-5.4: DNE
453kinetic_linux-gke-5.4: DNE
454
455Patches_linux-gke-5.15:
456upstream_linux-gke-5.15: needs-triage
457trusty_linux-gke-5.15: DNE
458xenial_linux-gke-5.15: DNE
459bionic_linux-gke-5.15: DNE
460focal_linux-gke-5.15: needs-triage
461jammy_linux-gke-5.15: DNE
462kinetic_linux-gke-5.15: DNE
463
464Patches_linux-gkeop:
465upstream_linux-gkeop: needs-triage
466trusty_linux-gkeop: DNE
467xenial_linux-gkeop: DNE
468bionic_linux-gkeop: DNE
469focal_linux-gkeop: needs-triage
470jammy_linux-gkeop: needs-triage
471kinetic_linux-gkeop: DNE
472
473Patches_linux-gkeop-5.4:
474upstream_linux-gkeop-5.4: needs-triage
475trusty_linux-gkeop-5.4: DNE
476xenial_linux-gkeop-5.4: DNE
477bionic_linux-gkeop-5.4: needs-triage
478focal_linux-gkeop-5.4: DNE
479jammy_linux-gkeop-5.4: DNE
480kinetic_linux-gkeop-5.4: DNE
481
482Patches_linux-ibm:
483upstream_linux-ibm: needs-triage
484trusty_linux-ibm: DNE
485xenial_linux-ibm: DNE
486bionic_linux-ibm: DNE
487focal_linux-ibm: needs-triage
488jammy_linux-ibm: needs-triage
489kinetic_linux-ibm: needs-triage
490devel_linux-ibm: needs-triage
491
492Patches_linux-ibm-5.4:
493upstream_linux-ibm-5.4: needs-triage
494trusty_linux-ibm-5.4: DNE
495xenial_linux-ibm-5.4: DNE
496bionic_linux-ibm-5.4: needs-triage
497focal_linux-ibm-5.4: DNE
498jammy_linux-ibm-5.4: DNE
499kinetic_linux-ibm-5.4: DNE
500
501Patches_linux-intel-5.13:
502upstream_linux-intel-5.13: needs-triage
503trusty_linux-intel-5.13: DNE
504xenial_linux-intel-5.13: DNE
505bionic_linux-intel-5.13: DNE
506focal_linux-intel-5.13: needs-triage
507jammy_linux-intel-5.13: DNE
508kinetic_linux-intel-5.13: DNE
509
510Patches_linux-intel-iotg:
511upstream_linux-intel-iotg: needs-triage
512trusty_linux-intel-iotg: DNE
513xenial_linux-intel-iotg: DNE
514bionic_linux-intel-iotg: DNE
515focal_linux-intel-iotg: DNE
516jammy_linux-intel-iotg: needs-triage
517kinetic_linux-intel-iotg: DNE
518
519Patches_linux-intel-iotg-5.15:
520upstream_linux-intel-iotg-5.15: needs-triage
521trusty_linux-intel-iotg-5.15: DNE
522xenial_linux-intel-iotg-5.15: DNE
523bionic_linux-intel-iotg-5.15: DNE
524focal_linux-intel-iotg-5.15: needs-triage
525jammy_linux-intel-iotg-5.15: DNE
526kinetic_linux-intel-iotg-5.15: DNE
527
528Patches_linux-lowlatency:
529upstream_linux-lowlatency: needs-triage
530trusty_linux-lowlatency: DNE
531xenial_linux-lowlatency: DNE
532bionic_linux-lowlatency: DNE
533focal_linux-lowlatency: DNE
534jammy_linux-lowlatency: needs-triage
535kinetic_linux-lowlatency: needs-triage
536devel_linux-lowlatency: needs-triage
537
538Patches_linux-lowlatency-hwe-5.15:
539upstream_linux-lowlatency-hwe-5.15: needs-triage
540trusty_linux-lowlatency-hwe-5.15: DNE
541xenial_linux-lowlatency-hwe-5.15: DNE
542bionic_linux-lowlatency-hwe-5.15: DNE
543focal_linux-lowlatency-hwe-5.15: needs-triage
544jammy_linux-lowlatency-hwe-5.15: DNE
545kinetic_linux-lowlatency-hwe-5.15: DNE
546
547Patches_linux-oracle:
548upstream_linux-oracle: needs-triage
549esm-infra/xenial_linux-oracle: needs-triage
550trusty_linux-oracle: DNE
551xenial_linux-oracle: ignored (end of standard support)
552bionic_linux-oracle: needs-triage
553focal_linux-oracle: needs-triage
554jammy_linux-oracle: needs-triage
555kinetic_linux-oracle: needs-triage
556devel_linux-oracle: needs-triage
557
558Patches_linux-oracle-5.0:
559upstream_linux-oracle-5.0: needs-triage
560trusty_linux-oracle-5.0: DNE
561xenial_linux-oracle-5.0: DNE
562bionic_linux-oracle-5.0: ignored (superseded by linux-oracle-5.3)
563focal_linux-oracle-5.0: DNE
564jammy_linux-oracle-5.0: DNE
565kinetic_linux-oracle-5.0: DNE
566
567Patches_linux-oracle-5.3:
568upstream_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4)
569trusty_linux-oracle-5.3: DNE
570xenial_linux-oracle-5.3: DNE
571bionic_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4)
572focal_linux-oracle-5.3: DNE
573jammy_linux-oracle-5.3: DNE
574kinetic_linux-oracle-5.3: DNE
575
576Patches_linux-oracle-5.4:
577upstream_linux-oracle-5.4: needs-triage
578trusty_linux-oracle-5.4: DNE
579xenial_linux-oracle-5.4: DNE
580bionic_linux-oracle-5.4: needs-triage
581focal_linux-oracle-5.4: DNE
582jammy_linux-oracle-5.4: DNE
583kinetic_linux-oracle-5.4: DNE
584
585Patches_linux-oracle-5.8:
586upstream_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11)
587trusty_linux-oracle-5.8: DNE
588xenial_linux-oracle-5.8: DNE
589bionic_linux-oracle-5.8: DNE
590focal_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11)
591jammy_linux-oracle-5.8: DNE
592kinetic_linux-oracle-5.8: DNE
593
594Patches_linux-oracle-5.11:
595upstream_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13)
596trusty_linux-oracle-5.11: DNE
597xenial_linux-oracle-5.11: DNE
598bionic_linux-oracle-5.11: DNE
599focal_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13)
600jammy_linux-oracle-5.11: DNE
601kinetic_linux-oracle-5.11: DNE
602
603Patches_linux-oracle-5.13:
604upstream_linux-oracle-5.13: needs-triage
605trusty_linux-oracle-5.13: DNE
606xenial_linux-oracle-5.13: DNE
607bionic_linux-oracle-5.13: DNE
608focal_linux-oracle-5.13: needs-triage
609jammy_linux-oracle-5.13: DNE
610kinetic_linux-oracle-5.13: DNE
611
612Patches_linux-oracle-5.15:
613upstream_linux-oracle-5.15: needs-triage
614trusty_linux-oracle-5.15: DNE
615xenial_linux-oracle-5.15: DNE
616bionic_linux-oracle-5.15: DNE
617focal_linux-oracle-5.15: needs-triage
618jammy_linux-oracle-5.15: DNE
619kinetic_linux-oracle-5.15: DNE
620
621Patches_linux-oem:
622upstream_linux-oem: needs-triage
623trusty_linux-oem: DNE
624xenial_linux-oem: ignored (superseded by linux-hwe)
625bionic_linux-oem: needs-triage
626focal_linux-oem: DNE
627jammy_linux-oem: DNE
628kinetic_linux-oem: DNE
629
630Patches_linux-oem-5.6:
631upstream_linux-oem-5.6: needs-triage
632trusty_linux-oem-5.6: DNE
633xenial_linux-oem-5.6: DNE
634bionic_linux-oem-5.6: DNE
635focal_linux-oem-5.6: needs-triage
636jammy_linux-oem-5.6: DNE
637kinetic_linux-oem-5.6: DNE
638
639Patches_linux-oem-5.10:
640upstream_linux-oem-5.10: needs-triage
641trusty_linux-oem-5.10: DNE
642xenial_linux-oem-5.10: DNE
643bionic_linux-oem-5.10: DNE
644focal_linux-oem-5.10: needs-triage
645jammy_linux-oem-5.10: DNE
646kinetic_linux-oem-5.10: DNE
647
648Patches_linux-oem-5.13:
649upstream_linux-oem-5.13: ignored (superseded by linux-oem-5.14)
650trusty_linux-oem-5.13: DNE
651xenial_linux-oem-5.13: DNE
652bionic_linux-oem-5.13: DNE
653focal_linux-oem-5.13: ignored (superseded by linux-oem-5.14)
654jammy_linux-oem-5.13: DNE
655kinetic_linux-oem-5.13: DNE
656
657Patches_linux-oem-5.14:
658upstream_linux-oem-5.14: needs-triage
659trusty_linux-oem-5.14: DNE
660xenial_linux-oem-5.14: DNE
661bionic_linux-oem-5.14: DNE
662focal_linux-oem-5.14: needs-triage
663jammy_linux-oem-5.14: DNE
664kinetic_linux-oem-5.14: DNE
665
666Patches_linux-oem-5.17:
667upstream_linux-oem-5.17: needs-triage
668trusty_linux-oem-5.17: DNE
669xenial_linux-oem-5.17: DNE
670bionic_linux-oem-5.17: DNE
671focal_linux-oem-5.17: DNE
672jammy_linux-oem-5.17: needs-triage
673kinetic_linux-oem-5.17: needs-triage
674devel_linux-oem-5.17: needs-triage
675
676Patches_linux-oem-osp1:
677upstream_linux-oem-osp1: needs-triage
678trusty_linux-oem-osp1: DNE
679xenial_linux-oem-osp1: DNE
680bionic_linux-oem-osp1: needs-triage
681focal_linux-oem-osp1: DNE
682jammy_linux-oem-osp1: DNE
683kinetic_linux-oem-osp1: DNE
684
685Patches_linux-raspi:
686upstream_linux-raspi: needs-triage
687trusty_linux-raspi: DNE
688xenial_linux-raspi: DNE
689bionic_linux-raspi: DNE
690focal_linux-raspi: needs-triage
691jammy_linux-raspi: needs-triage
692kinetic_linux-raspi: needs-triage
693devel_linux-raspi: needs-triage
694
695Patches_linux-raspi2:
696upstream_linux-raspi2: needs-triage
697trusty_linux-raspi2: DNE
698xenial_linux-raspi2: ignored (end of standard support)
699bionic_linux-raspi2: needs-triage
700focal_linux-raspi2: ignored (replaced by linux-raspi)
701jammy_linux-raspi2: DNE
702kinetic_linux-raspi2: DNE
703
704Patches_linux-raspi2-5.3:
705upstream_linux-raspi2-5.3: ignored (superseded by linux-raspi2-5.4)
706trusty_linux-raspi2-5.3: DNE
707xenial_linux-raspi2-5.3: DNE
708bionic_linux-raspi2-5.3: ignored (superseded by linux-raspi-5.4)
709focal_linux-raspi2-5.3: DNE
710jammy_linux-raspi2-5.3: DNE
711kinetic_linux-raspi2-5.3: DNE
712
713Patches_linux-raspi-5.4:
714upstream_linux-raspi-5.4: needs-triage
715trusty_linux-raspi-5.4: DNE
716xenial_linux-raspi-5.4: DNE
717bionic_linux-raspi-5.4: needs-triage
718focal_linux-raspi-5.4: DNE
719jammy_linux-raspi-5.4: DNE
720kinetic_linux-raspi-5.4: DNE
721
722Patches_linux-riscv:
723upstream_linux-riscv: needs-triage
724trusty_linux-riscv: DNE
725xenial_linux-riscv: DNE
726bionic_linux-riscv: DNE
727focal_linux-riscv: ignored (superseded by linux-riscv-5.8)
728jammy_linux-riscv: needs-triage
729kinetic_linux-riscv: needs-triage
730devel_linux-riscv: needs-triage
731
732Patches_linux-riscv-5.8:
733upstream_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11)
734trusty_linux-riscv-5.8: DNE
735xenial_linux-riscv-5.8: DNE
736bionic_linux-riscv-5.8: DNE
737focal_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11)
738jammy_linux-riscv-5.8: DNE
739kinetic_linux-riscv-5.8: DNE
740
741Patches_linux-riscv-5.11:
742upstream_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13)
743trusty_linux-riscv-5.11: DNE
744xenial_linux-riscv-5.11: DNE
745bionic_linux-riscv-5.11: DNE
746focal_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13)
747jammy_linux-riscv-5.11: DNE
748kinetic_linux-riscv-5.11: DNE
749
750Patches_linux-snapdragon:
751upstream_linux-snapdragon: needs-triage
752trusty_linux-snapdragon: DNE
753xenial_linux-snapdragon: ignored (end of standard support)
754bionic_linux-snapdragon: needs-triage
755focal_linux-snapdragon: DNE
756jammy_linux-snapdragon: DNE
757kinetic_linux-snapdragon: DNE
diff --git a/active/CVE-2022-20567 b/active/CVE-2022-20567
0new file mode 100644758new file mode 100644
index 0000000..d3f5620
--- /dev/null
+++ b/active/CVE-2022-20567
@@ -0,0 +1,757 @@
1Candidate: CVE-2022-20567
2PublicDate: 2022-12-06
3References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20567
5 https://git.kernel.org/linus/d02ba2a6110c530a32926af8ad441111774d2893
6Description:
7 [Unknown description]
8Ubuntu-Description:
9Notes:
10Mitigation:
11Bugs:
12Priority: medium
13Discovered-by:
14Assigned-to:
15CVSS:
16
17Patches_linux:
18 break-fix: ee40fb2e1eb5bc0ddd3f2f83c6e39a454ef5a741 d02ba2a6110c530a32926af8ad441111774d2893
19upstream_linux: released (4.15.11-1)
20esm-infra/xenial_linux: needs-triage
21trusty_linux: ignored (out of standard support)
22xenial_linux: ignored (out of standard support)
23bionic_linux: needs-triage
24focal_linux: not-affected (5.4.0-135.152)
25jammy_linux: not-affected
26kinetic_linux: not-affected
27trusty/esm_linux: not-affected
28devel_linux: not-affected
29
30Patches_linux-hwe:
31upstream_linux-hwe: needs-triage
32esm-infra/xenial_linux-hwe: needs-triage
33trusty_linux-hwe: DNE
34xenial_linux-hwe: ignored (end of standard support)
35bionic_linux-hwe: ignored (replaced by linux-hwe-5.4)
36focal_linux-hwe: DNE
37jammy_linux-hwe: DNE
38kinetic_linux-hwe: DNE
39
40Patches_linux-hwe-5.4:
41upstream_linux-hwe-5.4: needs-triage
42trusty_linux-hwe-5.4: DNE
43xenial_linux-hwe-5.4: DNE
44bionic_linux-hwe-5.4: needs-triage
45focal_linux-hwe-5.4: DNE
46jammy_linux-hwe-5.4: DNE
47kinetic_linux-hwe-5.4: DNE
48
49Patches_linux-hwe-5.8:
50upstream_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11)
51trusty_linux-hwe-5.8: DNE
52xenial_linux-hwe-5.8: DNE
53bionic_linux-hwe-5.8: DNE
54focal_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11)
55jammy_linux-hwe-5.8: DNE
56kinetic_linux-hwe-5.8: DNE
57
58Patches_linux-hwe-5.11:
59upstream_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13)
60trusty_linux-hwe-5.11: DNE
61xenial_linux-hwe-5.11: DNE
62bionic_linux-hwe-5.11: DNE
63focal_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13)
64jammy_linux-hwe-5.11: DNE
65kinetic_linux-hwe-5.11: DNE
66
67Patches_linux-hwe-5.13:
68upstream_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15)
69trusty_linux-hwe-5.13: DNE
70xenial_linux-hwe-5.13: DNE
71bionic_linux-hwe-5.13: DNE
72focal_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15)
73jammy_linux-hwe-5.13: DNE
74kinetic_linux-hwe-5.13: DNE
75
76Patches_linux-hwe-5.15:
77upstream_linux-hwe-5.15: needs-triage
78trusty_linux-hwe-5.15: DNE
79xenial_linux-hwe-5.15: DNE
80bionic_linux-hwe-5.15: DNE
81focal_linux-hwe-5.15: needs-triage
82jammy_linux-hwe-5.15: DNE
83kinetic_linux-hwe-5.15: DNE
84
85Patches_linux-hwe-edge:
86upstream_linux-hwe-edge: needs-triage
87esm-infra/xenial_linux-hwe-edge: ignored (superseded by linux-hwe)
88trusty_linux-hwe-edge: DNE
89xenial_linux-hwe-edge: ignored (superseded by linux-hwe)
90bionic_linux-hwe-edge: ignored (superseded by linux-hwe-5.4)
91focal_linux-hwe-edge: DNE
92jammy_linux-hwe-edge: DNE
93kinetic_linux-hwe-edge: DNE
94
95Patches_linux-lts-xenial:
96upstream_linux-lts-xenial: needs-triage
97trusty_linux-lts-xenial: ignored (out of standard support)
98xenial_linux-lts-xenial: DNE
99bionic_linux-lts-xenial: DNE
100focal_linux-lts-xenial: DNE
101jammy_linux-lts-xenial: DNE
102kinetic_linux-lts-xenial: DNE
103trusty/esm_linux-lts-xenial: needs-triage
104
105Patches_linux-kvm:
106upstream_linux-kvm: needs-triage
107esm-infra/xenial_linux-kvm: needs-triage
108trusty_linux-kvm: DNE
109xenial_linux-kvm: ignored (end of standard support)
110bionic_linux-kvm: needs-triage
111focal_linux-kvm: needs-triage
112jammy_linux-kvm: needs-triage
113kinetic_linux-kvm: needs-triage
114devel_linux-kvm: needs-triage
115
116Patches_linux-aws:
117upstream_linux-aws: needs-triage
118esm-infra/xenial_linux-aws: needs-triage
119trusty_linux-aws: ignored (out of standard support)
120xenial_linux-aws: ignored (end of standard support)
121bionic_linux-aws: needs-triage
122focal_linux-aws: needs-triage
123jammy_linux-aws: needs-triage
124kinetic_linux-aws: needs-triage
125trusty/esm_linux-aws: needs-triage
126devel_linux-aws: needs-triage
127
128Patches_linux-aws-5.0:
129upstream_linux-aws-5.0: needs-triage
130trusty_linux-aws-5.0: DNE
131xenial_linux-aws-5.0: DNE
132bionic_linux-aws-5.0: ignored (superseded by linux-aws-5.3)
133focal_linux-aws-5.0: DNE
134jammy_linux-aws-5.0: DNE
135kinetic_linux-aws-5.0: DNE
136
137Patches_linux-aws-5.3:
138upstream_linux-aws-5.3: ignored (superseded by linux-aws-5.4)
139trusty_linux-aws-5.3: DNE
140xenial_linux-aws-5.3: DNE
141bionic_linux-aws-5.3: ignored (superseded by linux-aws-5.4)
142focal_linux-aws-5.3: DNE
143jammy_linux-aws-5.3: DNE
144kinetic_linux-aws-5.3: DNE
145
146Patches_linux-aws-5.4:
147upstream_linux-aws-5.4: needs-triage
148trusty_linux-aws-5.4: DNE
149xenial_linux-aws-5.4: DNE
150bionic_linux-aws-5.4: needs-triage
151focal_linux-aws-5.4: DNE
152jammy_linux-aws-5.4: DNE
153kinetic_linux-aws-5.4: DNE
154
155Patches_linux-aws-5.8:
156upstream_linux-aws-5.8: ignored (superseded by linux-aws-5.11)
157trusty_linux-aws-5.8: DNE
158xenial_linux-aws-5.8: DNE
159bionic_linux-aws-5.8: DNE
160focal_linux-aws-5.8: ignored (superseded by linux-aws-5.11)
161jammy_linux-aws-5.8: DNE
162kinetic_linux-aws-5.8: DNE
163
164Patches_linux-aws-5.11:
165upstream_linux-aws-5.11: ignored (superseded by linux-aws-5.13)
166trusty_linux-aws-5.11: DNE
167xenial_linux-aws-5.11: DNE
168bionic_linux-aws-5.11: DNE
169focal_linux-aws-5.11: ignored (superseded by linux-aws-5.13)
170jammy_linux-aws-5.11: DNE
171kinetic_linux-aws-5.11: DNE
172
173Patches_linux-aws-5.13:
174upstream_linux-aws-5.13: ignored (superseded by linux-aws-5.15)
175trusty_linux-aws-5.13: DNE
176xenial_linux-aws-5.13: DNE
177bionic_linux-aws-5.13: DNE
178focal_linux-aws-5.13: ignored (superseded by linux-aws-5.15)
179jammy_linux-aws-5.13: DNE
180kinetic_linux-aws-5.13: DNE
181
182Patches_linux-aws-5.15:
183upstream_linux-aws-5.15: needs-triage
184trusty_linux-aws-5.15: DNE
185xenial_linux-aws-5.15: DNE
186bionic_linux-aws-5.15: DNE
187focal_linux-aws-5.15: needs-triage
188jammy_linux-aws-5.15: DNE
189kinetic_linux-aws-5.15: DNE
190
191Patches_linux-aws-hwe:
192upstream_linux-aws-hwe: needs-triage
193esm-infra/xenial_linux-aws-hwe: needs-triage
194trusty_linux-aws-hwe: DNE
195xenial_linux-aws-hwe: ignored (end of standard support)
196bionic_linux-aws-hwe: DNE
197focal_linux-aws-hwe: DNE
198jammy_linux-aws-hwe: DNE
199kinetic_linux-aws-hwe: DNE
200
201Patches_linux-azure:
202upstream_linux-azure: needs-triage
203esm-infra/xenial_linux-azure: needs-triage
204trusty_linux-azure: ignored (out of standard support)
205xenial_linux-azure: ignored (end of standard support)
206bionic_linux-azure: ignored (superseded by linux-azure-5.3)
207focal_linux-azure: needs-triage
208jammy_linux-azure: needs-triage
209kinetic_linux-azure: needs-triage
210trusty/esm_linux-azure: needs-triage
211devel_linux-azure: needs-triage
212
213Patches_linux-azure-4.15:
214upstream_linux-azure-4.15: needs-triage
215trusty_linux-azure-4.15: DNE
216xenial_linux-azure-4.15: DNE
217bionic_linux-azure-4.15: needs-triage
218focal_linux-azure-4.15: DNE
219jammy_linux-azure-4.15: DNE
220kinetic_linux-azure-4.15: DNE
221
222Patches_linux-azure-5.3:
223upstream_linux-azure-5.3: ignored (superseded by linux-azure-5.4)
224trusty_linux-azure-5.3: DNE
225xenial_linux-azure-5.3: DNE
226bionic_linux-azure-5.3: ignored (superseded by linux-azure-5.4)
227focal_linux-azure-5.3: DNE
228jammy_linux-azure-5.3: DNE
229kinetic_linux-azure-5.3: DNE
230
231Patches_linux-azure-5.4:
232upstream_linux-azure-5.4: needs-triage
233trusty_linux-azure-5.4: DNE
234xenial_linux-azure-5.4: DNE
235bionic_linux-azure-5.4: needs-triage
236focal_linux-azure-5.4: DNE
237jammy_linux-azure-5.4: DNE
238kinetic_linux-azure-5.4: DNE
239
240Patches_linux-azure-5.8:
241upstream_linux-azure-5.8: ignored (superseded by linux-azure-5.11)
242trusty_linux-azure-5.8: DNE
243xenial_linux-azure-5.8: DNE
244bionic_linux-azure-5.8: DNE
245focal_linux-azure-5.8: ignored (superseded by linux-azure-5.11)
246jammy_linux-azure-5.8: DNE
247kinetic_linux-azure-5.8: DNE
248
249Patches_linux-azure-5.11:
250upstream_linux-azure-5.11: ignored (superseded by linux-azure-5.13)
251trusty_linux-azure-5.11: DNE
252xenial_linux-azure-5.11: DNE
253bionic_linux-azure-5.11: DNE
254focal_linux-azure-5.11: ignored (superseded by linux-azure-5.13)
255jammy_linux-azure-5.11: DNE
256kinetic_linux-azure-5.11: DNE
257
258Patches_linux-azure-5.13:
259upstream_linux-azure-5.13: ignored (superseded by linux-azure-5.15)
260trusty_linux-azure-5.13: DNE
261xenial_linux-azure-5.13: DNE
262bionic_linux-azure-5.13: DNE
263focal_linux-azure-5.13: ignored (superseded by linux-azure-5.15)
264jammy_linux-azure-5.13: DNE
265kinetic_linux-azure-5.13: DNE
266
267Patches_linux-azure-5.15:
268upstream_linux-azure-5.15: needs-triage
269trusty_linux-azure-5.15: DNE
270xenial_linux-azure-5.15: DNE
271bionic_linux-azure-5.15: DNE
272focal_linux-azure-5.15: needs-triage
273jammy_linux-azure-5.15: DNE
274kinetic_linux-azure-5.15: DNE
275
276Patches_linux-azure-fde:
277upstream_linux-azure-fde: needs-triage
278trusty_linux-azure-fde: DNE
279xenial_linux-azure-fde: DNE
280bionic_linux-azure-fde: DNE
281focal_linux-azure-fde: needs-triage
282jammy_linux-azure-fde: needs-triage
283kinetic_linux-azure-fde: DNE
284
285Patches_linux-azure-fde-5.15:
286upstream_linux-azure-fde-5.15: needs-triage
287trusty_linux-azure-fde-5.15: DNE
288xenial_linux-azure-fde-5.15: DNE
289bionic_linux-azure-fde-5.15: DNE
290focal_linux-azure-fde-5.15: needs-triage
291jammy_linux-azure-fde-5.15: DNE
292kinetic_linux-azure-fde-5.15: DNE
293
294Patches_linux-bluefield:
295upstream_linux-bluefield: needs-triage
296trusty_linux-bluefield: DNE
297xenial_linux-bluefield: DNE
298bionic_linux-bluefield: DNE
299focal_linux-bluefield: needs-triage
300jammy_linux-bluefield: DNE
301kinetic_linux-bluefield: DNE
302
303Patches_linux-dell300x:
304upstream_linux-dell300x: needs-triage
305trusty_linux-dell300x: DNE
306xenial_linux-dell300x: DNE
307bionic_linux-dell300x: needs-triage
308focal_linux-dell300x: DNE
309jammy_linux-dell300x: DNE
310kinetic_linux-dell300x: DNE
311
312Patches_linux-azure-edge:
313upstream_linux-azure-edge: needs-triage
314trusty_linux-azure-edge: DNE
315xenial_linux-azure-edge: DNE
316bionic_linux-azure-edge: ignored (superseded by linux-azure-5.3)
317focal_linux-azure-edge: DNE
318jammy_linux-azure-edge: DNE
319kinetic_linux-azure-edge: DNE
320
321Patches_linux-fips:
322upstream_linux-fips: needs-triage
323trusty_linux-fips: ignored (out of standard support)
324xenial_linux-fips: ignored (out of standard support)
325bionic_linux-fips: DNE
326focal_linux-fips: DNE
327jammy_linux-fips: DNE
328kinetic_linux-fips: DNE
329fips/xenial_linux-fips: needs-triage
330fips/bionic_linux-fips: needs-triage
331fips/focal_linux-fips: needs-triage
332fips-updates/xenial_linux-fips: needs-triage
333fips-updates/bionic_linux-fips: needs-triage
334fips-updates/focal_linux-fips: needs-triage
335
336Patches_linux-gcp:
337upstream_linux-gcp: needs-triage
338esm-infra/xenial_linux-gcp: needs-triage
339trusty_linux-gcp: DNE
340xenial_linux-gcp: ignored (end of standard support)
341bionic_linux-gcp: ignored (superseded by linux-gcp-5.3)
342focal_linux-gcp: needs-triage
343jammy_linux-gcp: needs-triage
344kinetic_linux-gcp: needs-triage
345devel_linux-gcp: needs-triage
346
347Patches_linux-gcp-4.15:
348upstream_linux-gcp-4.15: needs-triage
349trusty_linux-gcp-4.15: DNE
350xenial_linux-gcp-4.15: DNE
351bionic_linux-gcp-4.15: needs-triage
352focal_linux-gcp-4.15: DNE
353jammy_linux-gcp-4.15: DNE
354kinetic_linux-gcp-4.15: DNE
355
356Patches_linux-gcp-5.3:
357upstream_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4)
358trusty_linux-gcp-5.3: DNE
359xenial_linux-gcp-5.3: DNE
360bionic_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4)
361focal_linux-gcp-5.3: DNE
362jammy_linux-gcp-5.3: DNE
363kinetic_linux-gcp-5.3: DNE
364
365Patches_linux-gcp-5.4:
366upstream_linux-gcp-5.4: needs-triage
367trusty_linux-gcp-5.4: DNE
368xenial_linux-gcp-5.4: DNE
369bionic_linux-gcp-5.4: needs-triage
370focal_linux-gcp-5.4: DNE
371jammy_linux-gcp-5.4: DNE
372kinetic_linux-gcp-5.4: DNE
373
374Patches_linux-gcp-5.8:
375upstream_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11)
376trusty_linux-gcp-5.8: DNE
377xenial_linux-gcp-5.8: DNE
378bionic_linux-gcp-5.8: DNE
379focal_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11)
380jammy_linux-gcp-5.8: DNE
381kinetic_linux-gcp-5.8: DNE
382
383Patches_linux-gcp-5.11:
384upstream_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13)
385trusty_linux-gcp-5.11: DNE
386xenial_linux-gcp-5.11: DNE
387bionic_linux-gcp-5.11: DNE
388focal_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13)
389jammy_linux-gcp-5.11: DNE
390kinetic_linux-gcp-5.11: DNE
391
392Patches_linux-gcp-5.13:
393upstream_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15)
394trusty_linux-gcp-5.13: DNE
395xenial_linux-gcp-5.13: DNE
396bionic_linux-gcp-5.13: DNE
397focal_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15)
398jammy_linux-gcp-5.13: DNE
399kinetic_linux-gcp-5.13: DNE
400
401Patches_linux-gcp-5.15:
402upstream_linux-gcp-5.15: needs-triage
403trusty_linux-gcp-5.15: DNE
404xenial_linux-gcp-5.15: DNE
405bionic_linux-gcp-5.15: DNE
406focal_linux-gcp-5.15: needs-triage
407jammy_linux-gcp-5.15: DNE
408kinetic_linux-gcp-5.15: DNE
409
410Patches_linux-gke:
411upstream_linux-gke: needs-triage
412trusty_linux-gke: DNE
413xenial_linux-gke: ignored (reached end of standard support)
414bionic_linux-gke: DNE
415focal_linux-gke: needs-triage
416jammy_linux-gke: needs-triage
417kinetic_linux-gke: DNE
418
419Patches_linux-gke-4.15:
420upstream_linux-gke-4.15: needs-triage
421trusty_linux-gke-4.15: DNE
422xenial_linux-gke-4.15: DNE
423bionic_linux-gke-4.15: needs-triage
424focal_linux-gke-4.15: DNE
425jammy_linux-gke-4.15: DNE
426kinetic_linux-gke-4.15: DNE
427
428Patches_linux-gke-5.0:
429upstream_linux-gke-5.0: needs-triage
430trusty_linux-gke-5.0: DNE
431xenial_linux-gke-5.0: DNE
432bionic_linux-gke-5.0: ignored (superseded by linux-gke-5.3)
433focal_linux-gke-5.0: DNE
434jammy_linux-gke-5.0: DNE
435kinetic_linux-gke-5.0: DNE
436
437Patches_linux-gke-5.3:
438upstream_linux-gke-5.3: ignored (superseded by linux-gke-5.4)
439trusty_linux-gke-5.3: DNE
440xenial_linux-gke-5.3: DNE
441bionic_linux-gke-5.3: ignored (superseded by linux-gke-5.4)
442focal_linux-gke-5.3: DNE
443jammy_linux-gke-5.3: DNE
444kinetic_linux-gke-5.3: DNE
445
446Patches_linux-gke-5.4:
447upstream_linux-gke-5.4: needs-triage
448trusty_linux-gke-5.4: DNE
449xenial_linux-gke-5.4: DNE
450bionic_linux-gke-5.4: needs-triage
451focal_linux-gke-5.4: DNE
452jammy_linux-gke-5.4: DNE
453kinetic_linux-gke-5.4: DNE
454
455Patches_linux-gke-5.15:
456upstream_linux-gke-5.15: needs-triage
457trusty_linux-gke-5.15: DNE
458xenial_linux-gke-5.15: DNE
459bionic_linux-gke-5.15: DNE
460focal_linux-gke-5.15: needs-triage
461jammy_linux-gke-5.15: DNE
462kinetic_linux-gke-5.15: DNE
463
464Patches_linux-gkeop:
465upstream_linux-gkeop: needs-triage
466trusty_linux-gkeop: DNE
467xenial_linux-gkeop: DNE
468bionic_linux-gkeop: DNE
469focal_linux-gkeop: needs-triage
470jammy_linux-gkeop: needs-triage
471kinetic_linux-gkeop: DNE
472
473Patches_linux-gkeop-5.4:
474upstream_linux-gkeop-5.4: needs-triage
475trusty_linux-gkeop-5.4: DNE
476xenial_linux-gkeop-5.4: DNE
477bionic_linux-gkeop-5.4: needs-triage
478focal_linux-gkeop-5.4: DNE
479jammy_linux-gkeop-5.4: DNE
480kinetic_linux-gkeop-5.4: DNE
481
482Patches_linux-ibm:
483upstream_linux-ibm: needs-triage
484trusty_linux-ibm: DNE
485xenial_linux-ibm: DNE
486bionic_linux-ibm: DNE
487focal_linux-ibm: needs-triage
488jammy_linux-ibm: needs-triage
489kinetic_linux-ibm: needs-triage
490devel_linux-ibm: needs-triage
491
492Patches_linux-ibm-5.4:
493upstream_linux-ibm-5.4: needs-triage
494trusty_linux-ibm-5.4: DNE
495xenial_linux-ibm-5.4: DNE
496bionic_linux-ibm-5.4: needs-triage
497focal_linux-ibm-5.4: DNE
498jammy_linux-ibm-5.4: DNE
499kinetic_linux-ibm-5.4: DNE
500
501Patches_linux-intel-5.13:
502upstream_linux-intel-5.13: needs-triage
503trusty_linux-intel-5.13: DNE
504xenial_linux-intel-5.13: DNE
505bionic_linux-intel-5.13: DNE
506focal_linux-intel-5.13: needs-triage
507jammy_linux-intel-5.13: DNE
508kinetic_linux-intel-5.13: DNE
509
510Patches_linux-intel-iotg:
511upstream_linux-intel-iotg: needs-triage
512trusty_linux-intel-iotg: DNE
513xenial_linux-intel-iotg: DNE
514bionic_linux-intel-iotg: DNE
515focal_linux-intel-iotg: DNE
516jammy_linux-intel-iotg: needs-triage
517kinetic_linux-intel-iotg: DNE
518
519Patches_linux-intel-iotg-5.15:
520upstream_linux-intel-iotg-5.15: needs-triage
521trusty_linux-intel-iotg-5.15: DNE
522xenial_linux-intel-iotg-5.15: DNE
523bionic_linux-intel-iotg-5.15: DNE
524focal_linux-intel-iotg-5.15: needs-triage
525jammy_linux-intel-iotg-5.15: DNE
526kinetic_linux-intel-iotg-5.15: DNE
527
528Patches_linux-lowlatency:
529upstream_linux-lowlatency: needs-triage
530trusty_linux-lowlatency: DNE
531xenial_linux-lowlatency: DNE
532bionic_linux-lowlatency: DNE
533focal_linux-lowlatency: DNE
534jammy_linux-lowlatency: needs-triage
535kinetic_linux-lowlatency: needs-triage
536devel_linux-lowlatency: needs-triage
537
538Patches_linux-lowlatency-hwe-5.15:
539upstream_linux-lowlatency-hwe-5.15: needs-triage
540trusty_linux-lowlatency-hwe-5.15: DNE
541xenial_linux-lowlatency-hwe-5.15: DNE
542bionic_linux-lowlatency-hwe-5.15: DNE
543focal_linux-lowlatency-hwe-5.15: needs-triage
544jammy_linux-lowlatency-hwe-5.15: DNE
545kinetic_linux-lowlatency-hwe-5.15: DNE
546
547Patches_linux-oracle:
548upstream_linux-oracle: needs-triage
549esm-infra/xenial_linux-oracle: needs-triage
550trusty_linux-oracle: DNE
551xenial_linux-oracle: ignored (end of standard support)
552bionic_linux-oracle: needs-triage
553focal_linux-oracle: needs-triage
554jammy_linux-oracle: needs-triage
555kinetic_linux-oracle: needs-triage
556devel_linux-oracle: needs-triage
557
558Patches_linux-oracle-5.0:
559upstream_linux-oracle-5.0: needs-triage
560trusty_linux-oracle-5.0: DNE
561xenial_linux-oracle-5.0: DNE
562bionic_linux-oracle-5.0: ignored (superseded by linux-oracle-5.3)
563focal_linux-oracle-5.0: DNE
564jammy_linux-oracle-5.0: DNE
565kinetic_linux-oracle-5.0: DNE
566
567Patches_linux-oracle-5.3:
568upstream_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4)
569trusty_linux-oracle-5.3: DNE
570xenial_linux-oracle-5.3: DNE
571bionic_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4)
572focal_linux-oracle-5.3: DNE
573jammy_linux-oracle-5.3: DNE
574kinetic_linux-oracle-5.3: DNE
575
576Patches_linux-oracle-5.4:
577upstream_linux-oracle-5.4: needs-triage
578trusty_linux-oracle-5.4: DNE
579xenial_linux-oracle-5.4: DNE
580bionic_linux-oracle-5.4: needs-triage
581focal_linux-oracle-5.4: DNE
582jammy_linux-oracle-5.4: DNE
583kinetic_linux-oracle-5.4: DNE
584
585Patches_linux-oracle-5.8:
586upstream_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11)
587trusty_linux-oracle-5.8: DNE
588xenial_linux-oracle-5.8: DNE
589bionic_linux-oracle-5.8: DNE
590focal_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11)
591jammy_linux-oracle-5.8: DNE
592kinetic_linux-oracle-5.8: DNE
593
594Patches_linux-oracle-5.11:
595upstream_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13)
596trusty_linux-oracle-5.11: DNE
597xenial_linux-oracle-5.11: DNE
598bionic_linux-oracle-5.11: DNE
599focal_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13)
600jammy_linux-oracle-5.11: DNE
601kinetic_linux-oracle-5.11: DNE
602
603Patches_linux-oracle-5.13:
604upstream_linux-oracle-5.13: needs-triage
605trusty_linux-oracle-5.13: DNE
606xenial_linux-oracle-5.13: DNE
607bionic_linux-oracle-5.13: DNE
608focal_linux-oracle-5.13: needs-triage
609jammy_linux-oracle-5.13: DNE
610kinetic_linux-oracle-5.13: DNE
611
612Patches_linux-oracle-5.15:
613upstream_linux-oracle-5.15: needs-triage
614trusty_linux-oracle-5.15: DNE
615xenial_linux-oracle-5.15: DNE
616bionic_linux-oracle-5.15: DNE
617focal_linux-oracle-5.15: needs-triage
618jammy_linux-oracle-5.15: DNE
619kinetic_linux-oracle-5.15: DNE
620
621Patches_linux-oem:
622upstream_linux-oem: needs-triage
623trusty_linux-oem: DNE
624xenial_linux-oem: ignored (superseded by linux-hwe)
625bionic_linux-oem: needs-triage
626focal_linux-oem: DNE
627jammy_linux-oem: DNE
628kinetic_linux-oem: DNE
629
630Patches_linux-oem-5.6:
631upstream_linux-oem-5.6: needs-triage
632trusty_linux-oem-5.6: DNE
633xenial_linux-oem-5.6: DNE
634bionic_linux-oem-5.6: DNE
635focal_linux-oem-5.6: needs-triage
636jammy_linux-oem-5.6: DNE
637kinetic_linux-oem-5.6: DNE
638
639Patches_linux-oem-5.10:
640upstream_linux-oem-5.10: needs-triage
641trusty_linux-oem-5.10: DNE
642xenial_linux-oem-5.10: DNE
643bionic_linux-oem-5.10: DNE
644focal_linux-oem-5.10: needs-triage
645jammy_linux-oem-5.10: DNE
646kinetic_linux-oem-5.10: DNE
647
648Patches_linux-oem-5.13:
649upstream_linux-oem-5.13: ignored (superseded by linux-oem-5.14)
650trusty_linux-oem-5.13: DNE
651xenial_linux-oem-5.13: DNE
652bionic_linux-oem-5.13: DNE
653focal_linux-oem-5.13: ignored (superseded by linux-oem-5.14)
654jammy_linux-oem-5.13: DNE
655kinetic_linux-oem-5.13: DNE
656
657Patches_linux-oem-5.14:
658upstream_linux-oem-5.14: needs-triage
659trusty_linux-oem-5.14: DNE
660xenial_linux-oem-5.14: DNE
661bionic_linux-oem-5.14: DNE
662focal_linux-oem-5.14: needs-triage
663jammy_linux-oem-5.14: DNE
664kinetic_linux-oem-5.14: DNE
665
666Patches_linux-oem-5.17:
667upstream_linux-oem-5.17: needs-triage
668trusty_linux-oem-5.17: DNE
669xenial_linux-oem-5.17: DNE
670bionic_linux-oem-5.17: DNE
671focal_linux-oem-5.17: DNE
672jammy_linux-oem-5.17: needs-triage
673kinetic_linux-oem-5.17: needs-triage
674devel_linux-oem-5.17: needs-triage
675
676Patches_linux-oem-osp1:
677upstream_linux-oem-osp1: needs-triage
678trusty_linux-oem-osp1: DNE
679xenial_linux-oem-osp1: DNE
680bionic_linux-oem-osp1: needs-triage
681focal_linux-oem-osp1: DNE
682jammy_linux-oem-osp1: DNE
683kinetic_linux-oem-osp1: DNE
684
685Patches_linux-raspi:
686upstream_linux-raspi: needs-triage
687trusty_linux-raspi: DNE
688xenial_linux-raspi: DNE
689bionic_linux-raspi: DNE
690focal_linux-raspi: needs-triage
691jammy_linux-raspi: needs-triage
692kinetic_linux-raspi: needs-triage
693devel_linux-raspi: needs-triage
694
695Patches_linux-raspi2:
696upstream_linux-raspi2: needs-triage
697trusty_linux-raspi2: DNE
698xenial_linux-raspi2: ignored (end of standard support)
699bionic_linux-raspi2: needs-triage
700focal_linux-raspi2: ignored (replaced by linux-raspi)
701jammy_linux-raspi2: DNE
702kinetic_linux-raspi2: DNE
703
704Patches_linux-raspi2-5.3:
705upstream_linux-raspi2-5.3: ignored (superseded by linux-raspi2-5.4)
706trusty_linux-raspi2-5.3: DNE
707xenial_linux-raspi2-5.3: DNE
708bionic_linux-raspi2-5.3: ignored (superseded by linux-raspi-5.4)
709focal_linux-raspi2-5.3: DNE
710jammy_linux-raspi2-5.3: DNE
711kinetic_linux-raspi2-5.3: DNE
712
713Patches_linux-raspi-5.4:
714upstream_linux-raspi-5.4: needs-triage
715trusty_linux-raspi-5.4: DNE
716xenial_linux-raspi-5.4: DNE
717bionic_linux-raspi-5.4: needs-triage
718focal_linux-raspi-5.4: DNE
719jammy_linux-raspi-5.4: DNE
720kinetic_linux-raspi-5.4: DNE
721
722Patches_linux-riscv:
723upstream_linux-riscv: needs-triage
724trusty_linux-riscv: DNE
725xenial_linux-riscv: DNE
726bionic_linux-riscv: DNE
727focal_linux-riscv: ignored (superseded by linux-riscv-5.8)
728jammy_linux-riscv: needs-triage
729kinetic_linux-riscv: needs-triage
730devel_linux-riscv: needs-triage
731
732Patches_linux-riscv-5.8:
733upstream_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11)
734trusty_linux-riscv-5.8: DNE
735xenial_linux-riscv-5.8: DNE
736bionic_linux-riscv-5.8: DNE
737focal_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11)
738jammy_linux-riscv-5.8: DNE
739kinetic_linux-riscv-5.8: DNE
740
741Patches_linux-riscv-5.11:
742upstream_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13)
743trusty_linux-riscv-5.11: DNE
744xenial_linux-riscv-5.11: DNE
745bionic_linux-riscv-5.11: DNE
746focal_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13)
747jammy_linux-riscv-5.11: DNE
748kinetic_linux-riscv-5.11: DNE
749
750Patches_linux-snapdragon:
751upstream_linux-snapdragon: needs-triage
752trusty_linux-snapdragon: DNE
753xenial_linux-snapdragon: ignored (end of standard support)
754bionic_linux-snapdragon: needs-triage
755focal_linux-snapdragon: DNE
756jammy_linux-snapdragon: DNE
757kinetic_linux-snapdragon: DNE
diff --git a/active/CVE-2022-20568 b/active/CVE-2022-20568
0new file mode 100644758new file mode 100644
index 0000000..e74b01d
--- /dev/null
+++ b/active/CVE-2022-20568
@@ -0,0 +1,759 @@
1Candidate: CVE-2022-20568
2PublicDate: 2022-12-06
3References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20568
5 https://source.android.com/docs/security/bulletin/pixel/2022-12-01
6 https://android.googlesource.com/kernel/common/+/bc80ea8a4296c4d75f7e3e27b65718cae09f20f1
7 https://lore.kernel.org/io-uring/YoOJ%2FT4QRKC+fAZE@google.com/
8Description:
9 [Unknown description]
10Ubuntu-Description:
11Notes:
12 amurray| Appears to only affect the upstream stable 5.10 kernel
13Mitigation:
14Bugs:
15Priority: medium
16Discovered-by:
17Assigned-to:
18CVSS:
19
20Patches_linux:
21upstream_linux: released (5.14.6-1)
22esm-infra/xenial_linux: needs-triage
23trusty_linux: ignored (out of standard support)
24xenial_linux: ignored (out of standard support)
25bionic_linux: needs-triage
26focal_linux: needs-triage
27jammy_linux: not-affected (5.15.0-56.62)
28kinetic_linux: not-affected
29trusty/esm_linux: not-affected
30devel_linux: not-affected
31
32Patches_linux-hwe:
33upstream_linux-hwe: needs-triage
34esm-infra/xenial_linux-hwe: needs-triage
35trusty_linux-hwe: DNE
36xenial_linux-hwe: ignored (end of standard support)
37bionic_linux-hwe: ignored (replaced by linux-hwe-5.4)
38focal_linux-hwe: DNE
39jammy_linux-hwe: DNE
40kinetic_linux-hwe: DNE
41
42Patches_linux-hwe-5.4:
43upstream_linux-hwe-5.4: needs-triage
44trusty_linux-hwe-5.4: DNE
45xenial_linux-hwe-5.4: DNE
46bionic_linux-hwe-5.4: needs-triage
47focal_linux-hwe-5.4: DNE
48jammy_linux-hwe-5.4: DNE
49kinetic_linux-hwe-5.4: DNE
50
51Patches_linux-hwe-5.8:
52upstream_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11)
53trusty_linux-hwe-5.8: DNE
54xenial_linux-hwe-5.8: DNE
55bionic_linux-hwe-5.8: DNE
56focal_linux-hwe-5.8: ignored (superseded by linux-hwe-5.11)
57jammy_linux-hwe-5.8: DNE
58kinetic_linux-hwe-5.8: DNE
59
60Patches_linux-hwe-5.11:
61upstream_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13)
62trusty_linux-hwe-5.11: DNE
63xenial_linux-hwe-5.11: DNE
64bionic_linux-hwe-5.11: DNE
65focal_linux-hwe-5.11: ignored (superseded by linux-hwe-5.13)
66jammy_linux-hwe-5.11: DNE
67kinetic_linux-hwe-5.11: DNE
68
69Patches_linux-hwe-5.13:
70upstream_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15)
71trusty_linux-hwe-5.13: DNE
72xenial_linux-hwe-5.13: DNE
73bionic_linux-hwe-5.13: DNE
74focal_linux-hwe-5.13: ignored (superseded by linux-hwe-5.15)
75jammy_linux-hwe-5.13: DNE
76kinetic_linux-hwe-5.13: DNE
77
78Patches_linux-hwe-5.15:
79upstream_linux-hwe-5.15: needs-triage
80trusty_linux-hwe-5.15: DNE
81xenial_linux-hwe-5.15: DNE
82bionic_linux-hwe-5.15: DNE
83focal_linux-hwe-5.15: needs-triage
84jammy_linux-hwe-5.15: DNE
85kinetic_linux-hwe-5.15: DNE
86
87Patches_linux-hwe-edge:
88upstream_linux-hwe-edge: needs-triage
89esm-infra/xenial_linux-hwe-edge: ignored (superseded by linux-hwe)
90trusty_linux-hwe-edge: DNE
91xenial_linux-hwe-edge: ignored (superseded by linux-hwe)
92bionic_linux-hwe-edge: ignored (superseded by linux-hwe-5.4)
93focal_linux-hwe-edge: DNE
94jammy_linux-hwe-edge: DNE
95kinetic_linux-hwe-edge: DNE
96
97Patches_linux-lts-xenial:
98upstream_linux-lts-xenial: needs-triage
99trusty_linux-lts-xenial: ignored (out of standard support)
100xenial_linux-lts-xenial: DNE
101bionic_linux-lts-xenial: DNE
102focal_linux-lts-xenial: DNE
103jammy_linux-lts-xenial: DNE
104kinetic_linux-lts-xenial: DNE
105trusty/esm_linux-lts-xenial: needs-triage
106
107Patches_linux-kvm:
108upstream_linux-kvm: needs-triage
109esm-infra/xenial_linux-kvm: needs-triage
110trusty_linux-kvm: DNE
111xenial_linux-kvm: ignored (end of standard support)
112bionic_linux-kvm: needs-triage
113focal_linux-kvm: needs-triage
114jammy_linux-kvm: needs-triage
115kinetic_linux-kvm: needs-triage
116devel_linux-kvm: needs-triage
117
118Patches_linux-aws:
119upstream_linux-aws: needs-triage
120esm-infra/xenial_linux-aws: needs-triage
121trusty_linux-aws: ignored (out of standard support)
122xenial_linux-aws: ignored (end of standard support)
123bionic_linux-aws: needs-triage
124focal_linux-aws: needs-triage
125jammy_linux-aws: needs-triage
126kinetic_linux-aws: needs-triage
127trusty/esm_linux-aws: needs-triage
128devel_linux-aws: needs-triage
129
130Patches_linux-aws-5.0:
131upstream_linux-aws-5.0: needs-triage
132trusty_linux-aws-5.0: DNE
133xenial_linux-aws-5.0: DNE
134bionic_linux-aws-5.0: ignored (superseded by linux-aws-5.3)
135focal_linux-aws-5.0: DNE
136jammy_linux-aws-5.0: DNE
137kinetic_linux-aws-5.0: DNE
138
139Patches_linux-aws-5.3:
140upstream_linux-aws-5.3: ignored (superseded by linux-aws-5.4)
141trusty_linux-aws-5.3: DNE
142xenial_linux-aws-5.3: DNE
143bionic_linux-aws-5.3: ignored (superseded by linux-aws-5.4)
144focal_linux-aws-5.3: DNE
145jammy_linux-aws-5.3: DNE
146kinetic_linux-aws-5.3: DNE
147
148Patches_linux-aws-5.4:
149upstream_linux-aws-5.4: needs-triage
150trusty_linux-aws-5.4: DNE
151xenial_linux-aws-5.4: DNE
152bionic_linux-aws-5.4: needs-triage
153focal_linux-aws-5.4: DNE
154jammy_linux-aws-5.4: DNE
155kinetic_linux-aws-5.4: DNE
156
157Patches_linux-aws-5.8:
158upstream_linux-aws-5.8: ignored (superseded by linux-aws-5.11)
159trusty_linux-aws-5.8: DNE
160xenial_linux-aws-5.8: DNE
161bionic_linux-aws-5.8: DNE
162focal_linux-aws-5.8: ignored (superseded by linux-aws-5.11)
163jammy_linux-aws-5.8: DNE
164kinetic_linux-aws-5.8: DNE
165
166Patches_linux-aws-5.11:
167upstream_linux-aws-5.11: ignored (superseded by linux-aws-5.13)
168trusty_linux-aws-5.11: DNE
169xenial_linux-aws-5.11: DNE
170bionic_linux-aws-5.11: DNE
171focal_linux-aws-5.11: ignored (superseded by linux-aws-5.13)
172jammy_linux-aws-5.11: DNE
173kinetic_linux-aws-5.11: DNE
174
175Patches_linux-aws-5.13:
176upstream_linux-aws-5.13: ignored (superseded by linux-aws-5.15)
177trusty_linux-aws-5.13: DNE
178xenial_linux-aws-5.13: DNE
179bionic_linux-aws-5.13: DNE
180focal_linux-aws-5.13: ignored (superseded by linux-aws-5.15)
181jammy_linux-aws-5.13: DNE
182kinetic_linux-aws-5.13: DNE
183
184Patches_linux-aws-5.15:
185upstream_linux-aws-5.15: needs-triage
186trusty_linux-aws-5.15: DNE
187xenial_linux-aws-5.15: DNE
188bionic_linux-aws-5.15: DNE
189focal_linux-aws-5.15: needs-triage
190jammy_linux-aws-5.15: DNE
191kinetic_linux-aws-5.15: DNE
192
193Patches_linux-aws-hwe:
194upstream_linux-aws-hwe: needs-triage
195esm-infra/xenial_linux-aws-hwe: needs-triage
196trusty_linux-aws-hwe: DNE
197xenial_linux-aws-hwe: ignored (end of standard support)
198bionic_linux-aws-hwe: DNE
199focal_linux-aws-hwe: DNE
200jammy_linux-aws-hwe: DNE
201kinetic_linux-aws-hwe: DNE
202
203Patches_linux-azure:
204upstream_linux-azure: needs-triage
205esm-infra/xenial_linux-azure: needs-triage
206trusty_linux-azure: ignored (out of standard support)
207xenial_linux-azure: ignored (end of standard support)
208bionic_linux-azure: ignored (superseded by linux-azure-5.3)
209focal_linux-azure: needs-triage
210jammy_linux-azure: needs-triage
211kinetic_linux-azure: needs-triage
212trusty/esm_linux-azure: needs-triage
213devel_linux-azure: needs-triage
214
215Patches_linux-azure-4.15:
216upstream_linux-azure-4.15: needs-triage
217trusty_linux-azure-4.15: DNE
218xenial_linux-azure-4.15: DNE
219bionic_linux-azure-4.15: needs-triage
220focal_linux-azure-4.15: DNE
221jammy_linux-azure-4.15: DNE
222kinetic_linux-azure-4.15: DNE
223
224Patches_linux-azure-5.3:
225upstream_linux-azure-5.3: ignored (superseded by linux-azure-5.4)
226trusty_linux-azure-5.3: DNE
227xenial_linux-azure-5.3: DNE
228bionic_linux-azure-5.3: ignored (superseded by linux-azure-5.4)
229focal_linux-azure-5.3: DNE
230jammy_linux-azure-5.3: DNE
231kinetic_linux-azure-5.3: DNE
232
233Patches_linux-azure-5.4:
234upstream_linux-azure-5.4: needs-triage
235trusty_linux-azure-5.4: DNE
236xenial_linux-azure-5.4: DNE
237bionic_linux-azure-5.4: needs-triage
238focal_linux-azure-5.4: DNE
239jammy_linux-azure-5.4: DNE
240kinetic_linux-azure-5.4: DNE
241
242Patches_linux-azure-5.8:
243upstream_linux-azure-5.8: ignored (superseded by linux-azure-5.11)
244trusty_linux-azure-5.8: DNE
245xenial_linux-azure-5.8: DNE
246bionic_linux-azure-5.8: DNE
247focal_linux-azure-5.8: ignored (superseded by linux-azure-5.11)
248jammy_linux-azure-5.8: DNE
249kinetic_linux-azure-5.8: DNE
250
251Patches_linux-azure-5.11:
252upstream_linux-azure-5.11: ignored (superseded by linux-azure-5.13)
253trusty_linux-azure-5.11: DNE
254xenial_linux-azure-5.11: DNE
255bionic_linux-azure-5.11: DNE
256focal_linux-azure-5.11: ignored (superseded by linux-azure-5.13)
257jammy_linux-azure-5.11: DNE
258kinetic_linux-azure-5.11: DNE
259
260Patches_linux-azure-5.13:
261upstream_linux-azure-5.13: ignored (superseded by linux-azure-5.15)
262trusty_linux-azure-5.13: DNE
263xenial_linux-azure-5.13: DNE
264bionic_linux-azure-5.13: DNE
265focal_linux-azure-5.13: ignored (superseded by linux-azure-5.15)
266jammy_linux-azure-5.13: DNE
267kinetic_linux-azure-5.13: DNE
268
269Patches_linux-azure-5.15:
270upstream_linux-azure-5.15: needs-triage
271trusty_linux-azure-5.15: DNE
272xenial_linux-azure-5.15: DNE
273bionic_linux-azure-5.15: DNE
274focal_linux-azure-5.15: needs-triage
275jammy_linux-azure-5.15: DNE
276kinetic_linux-azure-5.15: DNE
277
278Patches_linux-azure-fde:
279upstream_linux-azure-fde: needs-triage
280trusty_linux-azure-fde: DNE
281xenial_linux-azure-fde: DNE
282bionic_linux-azure-fde: DNE
283focal_linux-azure-fde: needs-triage
284jammy_linux-azure-fde: needs-triage
285kinetic_linux-azure-fde: DNE
286
287Patches_linux-azure-fde-5.15:
288upstream_linux-azure-fde-5.15: needs-triage
289trusty_linux-azure-fde-5.15: DNE
290xenial_linux-azure-fde-5.15: DNE
291bionic_linux-azure-fde-5.15: DNE
292focal_linux-azure-fde-5.15: needs-triage
293jammy_linux-azure-fde-5.15: DNE
294kinetic_linux-azure-fde-5.15: DNE
295
296Patches_linux-bluefield:
297upstream_linux-bluefield: needs-triage
298trusty_linux-bluefield: DNE
299xenial_linux-bluefield: DNE
300bionic_linux-bluefield: DNE
301focal_linux-bluefield: needs-triage
302jammy_linux-bluefield: DNE
303kinetic_linux-bluefield: DNE
304
305Patches_linux-dell300x:
306upstream_linux-dell300x: needs-triage
307trusty_linux-dell300x: DNE
308xenial_linux-dell300x: DNE
309bionic_linux-dell300x: needs-triage
310focal_linux-dell300x: DNE
311jammy_linux-dell300x: DNE
312kinetic_linux-dell300x: DNE
313
314Patches_linux-azure-edge:
315upstream_linux-azure-edge: needs-triage
316trusty_linux-azure-edge: DNE
317xenial_linux-azure-edge: DNE
318bionic_linux-azure-edge: ignored (superseded by linux-azure-5.3)
319focal_linux-azure-edge: DNE
320jammy_linux-azure-edge: DNE
321kinetic_linux-azure-edge: DNE
322
323Patches_linux-fips:
324upstream_linux-fips: needs-triage
325trusty_linux-fips: ignored (out of standard support)
326xenial_linux-fips: ignored (out of standard support)
327bionic_linux-fips: DNE
328focal_linux-fips: DNE
329jammy_linux-fips: DNE
330kinetic_linux-fips: DNE
331fips/xenial_linux-fips: needs-triage
332fips/bionic_linux-fips: needs-triage
333fips/focal_linux-fips: needs-triage
334fips-updates/xenial_linux-fips: needs-triage
335fips-updates/bionic_linux-fips: needs-triage
336fips-updates/focal_linux-fips: needs-triage
337
338Patches_linux-gcp:
339upstream_linux-gcp: needs-triage
340esm-infra/xenial_linux-gcp: needs-triage
341trusty_linux-gcp: DNE
342xenial_linux-gcp: ignored (end of standard support)
343bionic_linux-gcp: ignored (superseded by linux-gcp-5.3)
344focal_linux-gcp: needs-triage
345jammy_linux-gcp: needs-triage
346kinetic_linux-gcp: needs-triage
347devel_linux-gcp: needs-triage
348
349Patches_linux-gcp-4.15:
350upstream_linux-gcp-4.15: needs-triage
351trusty_linux-gcp-4.15: DNE
352xenial_linux-gcp-4.15: DNE
353bionic_linux-gcp-4.15: needs-triage
354focal_linux-gcp-4.15: DNE
355jammy_linux-gcp-4.15: DNE
356kinetic_linux-gcp-4.15: DNE
357
358Patches_linux-gcp-5.3:
359upstream_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4)
360trusty_linux-gcp-5.3: DNE
361xenial_linux-gcp-5.3: DNE
362bionic_linux-gcp-5.3: ignored (superseded by linux-gcp-5.4)
363focal_linux-gcp-5.3: DNE
364jammy_linux-gcp-5.3: DNE
365kinetic_linux-gcp-5.3: DNE
366
367Patches_linux-gcp-5.4:
368upstream_linux-gcp-5.4: needs-triage
369trusty_linux-gcp-5.4: DNE
370xenial_linux-gcp-5.4: DNE
371bionic_linux-gcp-5.4: needs-triage
372focal_linux-gcp-5.4: DNE
373jammy_linux-gcp-5.4: DNE
374kinetic_linux-gcp-5.4: DNE
375
376Patches_linux-gcp-5.8:
377upstream_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11)
378trusty_linux-gcp-5.8: DNE
379xenial_linux-gcp-5.8: DNE
380bionic_linux-gcp-5.8: DNE
381focal_linux-gcp-5.8: ignored (superseded by linux-gcp-5.11)
382jammy_linux-gcp-5.8: DNE
383kinetic_linux-gcp-5.8: DNE
384
385Patches_linux-gcp-5.11:
386upstream_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13)
387trusty_linux-gcp-5.11: DNE
388xenial_linux-gcp-5.11: DNE
389bionic_linux-gcp-5.11: DNE
390focal_linux-gcp-5.11: ignored (superseded by linux-gcp-5.13)
391jammy_linux-gcp-5.11: DNE
392kinetic_linux-gcp-5.11: DNE
393
394Patches_linux-gcp-5.13:
395upstream_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15)
396trusty_linux-gcp-5.13: DNE
397xenial_linux-gcp-5.13: DNE
398bionic_linux-gcp-5.13: DNE
399focal_linux-gcp-5.13: ignored (superseded by linux-gcp-5.15)
400jammy_linux-gcp-5.13: DNE
401kinetic_linux-gcp-5.13: DNE
402
403Patches_linux-gcp-5.15:
404upstream_linux-gcp-5.15: needs-triage
405trusty_linux-gcp-5.15: DNE
406xenial_linux-gcp-5.15: DNE
407bionic_linux-gcp-5.15: DNE
408focal_linux-gcp-5.15: needs-triage
409jammy_linux-gcp-5.15: DNE
410kinetic_linux-gcp-5.15: DNE
411
412Patches_linux-gke:
413upstream_linux-gke: needs-triage
414trusty_linux-gke: DNE
415xenial_linux-gke: ignored (reached end of standard support)
416bionic_linux-gke: DNE
417focal_linux-gke: needs-triage
418jammy_linux-gke: needs-triage
419kinetic_linux-gke: DNE
420
421Patches_linux-gke-4.15:
422upstream_linux-gke-4.15: needs-triage
423trusty_linux-gke-4.15: DNE
424xenial_linux-gke-4.15: DNE
425bionic_linux-gke-4.15: needs-triage
426focal_linux-gke-4.15: DNE
427jammy_linux-gke-4.15: DNE
428kinetic_linux-gke-4.15: DNE
429
430Patches_linux-gke-5.0:
431upstream_linux-gke-5.0: needs-triage
432trusty_linux-gke-5.0: DNE
433xenial_linux-gke-5.0: DNE
434bionic_linux-gke-5.0: ignored (superseded by linux-gke-5.3)
435focal_linux-gke-5.0: DNE
436jammy_linux-gke-5.0: DNE
437kinetic_linux-gke-5.0: DNE
438
439Patches_linux-gke-5.3:
440upstream_linux-gke-5.3: ignored (superseded by linux-gke-5.4)
441trusty_linux-gke-5.3: DNE
442xenial_linux-gke-5.3: DNE
443bionic_linux-gke-5.3: ignored (superseded by linux-gke-5.4)
444focal_linux-gke-5.3: DNE
445jammy_linux-gke-5.3: DNE
446kinetic_linux-gke-5.3: DNE
447
448Patches_linux-gke-5.4:
449upstream_linux-gke-5.4: needs-triage
450trusty_linux-gke-5.4: DNE
451xenial_linux-gke-5.4: DNE
452bionic_linux-gke-5.4: needs-triage
453focal_linux-gke-5.4: DNE
454jammy_linux-gke-5.4: DNE
455kinetic_linux-gke-5.4: DNE
456
457Patches_linux-gke-5.15:
458upstream_linux-gke-5.15: needs-triage
459trusty_linux-gke-5.15: DNE
460xenial_linux-gke-5.15: DNE
461bionic_linux-gke-5.15: DNE
462focal_linux-gke-5.15: needs-triage
463jammy_linux-gke-5.15: DNE
464kinetic_linux-gke-5.15: DNE
465
466Patches_linux-gkeop:
467upstream_linux-gkeop: needs-triage
468trusty_linux-gkeop: DNE
469xenial_linux-gkeop: DNE
470bionic_linux-gkeop: DNE
471focal_linux-gkeop: needs-triage
472jammy_linux-gkeop: needs-triage
473kinetic_linux-gkeop: DNE
474
475Patches_linux-gkeop-5.4:
476upstream_linux-gkeop-5.4: needs-triage
477trusty_linux-gkeop-5.4: DNE
478xenial_linux-gkeop-5.4: DNE
479bionic_linux-gkeop-5.4: needs-triage
480focal_linux-gkeop-5.4: DNE
481jammy_linux-gkeop-5.4: DNE
482kinetic_linux-gkeop-5.4: DNE
483
484Patches_linux-ibm:
485upstream_linux-ibm: needs-triage
486trusty_linux-ibm: DNE
487xenial_linux-ibm: DNE
488bionic_linux-ibm: DNE
489focal_linux-ibm: needs-triage
490jammy_linux-ibm: needs-triage
491kinetic_linux-ibm: needs-triage
492devel_linux-ibm: needs-triage
493
494Patches_linux-ibm-5.4:
495upstream_linux-ibm-5.4: needs-triage
496trusty_linux-ibm-5.4: DNE
497xenial_linux-ibm-5.4: DNE
498bionic_linux-ibm-5.4: needs-triage
499focal_linux-ibm-5.4: DNE
500jammy_linux-ibm-5.4: DNE
501kinetic_linux-ibm-5.4: DNE
502
503Patches_linux-intel-5.13:
504upstream_linux-intel-5.13: needs-triage
505trusty_linux-intel-5.13: DNE
506xenial_linux-intel-5.13: DNE
507bionic_linux-intel-5.13: DNE
508focal_linux-intel-5.13: needs-triage
509jammy_linux-intel-5.13: DNE
510kinetic_linux-intel-5.13: DNE
511
512Patches_linux-intel-iotg:
513upstream_linux-intel-iotg: needs-triage
514trusty_linux-intel-iotg: DNE
515xenial_linux-intel-iotg: DNE
516bionic_linux-intel-iotg: DNE
517focal_linux-intel-iotg: DNE
518jammy_linux-intel-iotg: needs-triage
519kinetic_linux-intel-iotg: DNE
520
521Patches_linux-intel-iotg-5.15:
522upstream_linux-intel-iotg-5.15: needs-triage
523trusty_linux-intel-iotg-5.15: DNE
524xenial_linux-intel-iotg-5.15: DNE
525bionic_linux-intel-iotg-5.15: DNE
526focal_linux-intel-iotg-5.15: needs-triage
527jammy_linux-intel-iotg-5.15: DNE
528kinetic_linux-intel-iotg-5.15: DNE
529
530Patches_linux-lowlatency:
531upstream_linux-lowlatency: needs-triage
532trusty_linux-lowlatency: DNE
533xenial_linux-lowlatency: DNE
534bionic_linux-lowlatency: DNE
535focal_linux-lowlatency: DNE
536jammy_linux-lowlatency: needs-triage
537kinetic_linux-lowlatency: needs-triage
538devel_linux-lowlatency: needs-triage
539
540Patches_linux-lowlatency-hwe-5.15:
541upstream_linux-lowlatency-hwe-5.15: needs-triage
542trusty_linux-lowlatency-hwe-5.15: DNE
543xenial_linux-lowlatency-hwe-5.15: DNE
544bionic_linux-lowlatency-hwe-5.15: DNE
545focal_linux-lowlatency-hwe-5.15: needs-triage
546jammy_linux-lowlatency-hwe-5.15: DNE
547kinetic_linux-lowlatency-hwe-5.15: DNE
548
549Patches_linux-oracle:
550upstream_linux-oracle: needs-triage
551esm-infra/xenial_linux-oracle: needs-triage
552trusty_linux-oracle: DNE
553xenial_linux-oracle: ignored (end of standard support)
554bionic_linux-oracle: needs-triage
555focal_linux-oracle: needs-triage
556jammy_linux-oracle: needs-triage
557kinetic_linux-oracle: needs-triage
558devel_linux-oracle: needs-triage
559
560Patches_linux-oracle-5.0:
561upstream_linux-oracle-5.0: needs-triage
562trusty_linux-oracle-5.0: DNE
563xenial_linux-oracle-5.0: DNE
564bionic_linux-oracle-5.0: ignored (superseded by linux-oracle-5.3)
565focal_linux-oracle-5.0: DNE
566jammy_linux-oracle-5.0: DNE
567kinetic_linux-oracle-5.0: DNE
568
569Patches_linux-oracle-5.3:
570upstream_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4)
571trusty_linux-oracle-5.3: DNE
572xenial_linux-oracle-5.3: DNE
573bionic_linux-oracle-5.3: ignored (superseded by linux-oracle-5.4)
574focal_linux-oracle-5.3: DNE
575jammy_linux-oracle-5.3: DNE
576kinetic_linux-oracle-5.3: DNE
577
578Patches_linux-oracle-5.4:
579upstream_linux-oracle-5.4: needs-triage
580trusty_linux-oracle-5.4: DNE
581xenial_linux-oracle-5.4: DNE
582bionic_linux-oracle-5.4: needs-triage
583focal_linux-oracle-5.4: DNE
584jammy_linux-oracle-5.4: DNE
585kinetic_linux-oracle-5.4: DNE
586
587Patches_linux-oracle-5.8:
588upstream_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11)
589trusty_linux-oracle-5.8: DNE
590xenial_linux-oracle-5.8: DNE
591bionic_linux-oracle-5.8: DNE
592focal_linux-oracle-5.8: ignored (superseded by linux-oracle-5.11)
593jammy_linux-oracle-5.8: DNE
594kinetic_linux-oracle-5.8: DNE
595
596Patches_linux-oracle-5.11:
597upstream_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13)
598trusty_linux-oracle-5.11: DNE
599xenial_linux-oracle-5.11: DNE
600bionic_linux-oracle-5.11: DNE
601focal_linux-oracle-5.11: ignored (superseded by linux-oracle-5.13)
602jammy_linux-oracle-5.11: DNE
603kinetic_linux-oracle-5.11: DNE
604
605Patches_linux-oracle-5.13:
606upstream_linux-oracle-5.13: needs-triage
607trusty_linux-oracle-5.13: DNE
608xenial_linux-oracle-5.13: DNE
609bionic_linux-oracle-5.13: DNE
610focal_linux-oracle-5.13: needs-triage
611jammy_linux-oracle-5.13: DNE
612kinetic_linux-oracle-5.13: DNE
613
614Patches_linux-oracle-5.15:
615upstream_linux-oracle-5.15: needs-triage
616trusty_linux-oracle-5.15: DNE
617xenial_linux-oracle-5.15: DNE
618bionic_linux-oracle-5.15: DNE
619focal_linux-oracle-5.15: needs-triage
620jammy_linux-oracle-5.15: DNE
621kinetic_linux-oracle-5.15: DNE
622
623Patches_linux-oem:
624upstream_linux-oem: needs-triage
625trusty_linux-oem: DNE
626xenial_linux-oem: ignored (superseded by linux-hwe)
627bionic_linux-oem: needs-triage
628focal_linux-oem: DNE
629jammy_linux-oem: DNE
630kinetic_linux-oem: DNE
631
632Patches_linux-oem-5.6:
633upstream_linux-oem-5.6: needs-triage
634trusty_linux-oem-5.6: DNE
635xenial_linux-oem-5.6: DNE
636bionic_linux-oem-5.6: DNE
637focal_linux-oem-5.6: needs-triage
638jammy_linux-oem-5.6: DNE
639kinetic_linux-oem-5.6: DNE
640
641Patches_linux-oem-5.10:
642upstream_linux-oem-5.10: needs-triage
643trusty_linux-oem-5.10: DNE
644xenial_linux-oem-5.10: DNE
645bionic_linux-oem-5.10: DNE
646focal_linux-oem-5.10: needs-triage
647jammy_linux-oem-5.10: DNE
648kinetic_linux-oem-5.10: DNE
649
650Patches_linux-oem-5.13:
651upstream_linux-oem-5.13: ignored (superseded by linux-oem-5.14)
652trusty_linux-oem-5.13: DNE
653xenial_linux-oem-5.13: DNE
654bionic_linux-oem-5.13: DNE
655focal_linux-oem-5.13: ignored (superseded by linux-oem-5.14)
656jammy_linux-oem-5.13: DNE
657kinetic_linux-oem-5.13: DNE
658
659Patches_linux-oem-5.14:
660upstream_linux-oem-5.14: needs-triage
661trusty_linux-oem-5.14: DNE
662xenial_linux-oem-5.14: DNE
663bionic_linux-oem-5.14: DNE
664focal_linux-oem-5.14: needs-triage
665jammy_linux-oem-5.14: DNE
666kinetic_linux-oem-5.14: DNE
667
668Patches_linux-oem-5.17:
669upstream_linux-oem-5.17: needs-triage
670trusty_linux-oem-5.17: DNE
671xenial_linux-oem-5.17: DNE
672bionic_linux-oem-5.17: DNE
673focal_linux-oem-5.17: DNE
674jammy_linux-oem-5.17: needs-triage
675kinetic_linux-oem-5.17: needs-triage
676devel_linux-oem-5.17: needs-triage
677
678Patches_linux-oem-osp1:
679upstream_linux-oem-osp1: needs-triage
680trusty_linux-oem-osp1: DNE
681xenial_linux-oem-osp1: DNE
682bionic_linux-oem-osp1: needs-triage
683focal_linux-oem-osp1: DNE
684jammy_linux-oem-osp1: DNE
685kinetic_linux-oem-osp1: DNE
686
687Patches_linux-raspi:
688upstream_linux-raspi: needs-triage
689trusty_linux-raspi: DNE
690xenial_linux-raspi: DNE
691bionic_linux-raspi: DNE
692focal_linux-raspi: needs-triage
693jammy_linux-raspi: needs-triage
694kinetic_linux-raspi: needs-triage
695devel_linux-raspi: needs-triage
696
697Patches_linux-raspi2:
698upstream_linux-raspi2: needs-triage
699trusty_linux-raspi2: DNE
700xenial_linux-raspi2: ignored (end of standard support)
701bionic_linux-raspi2: needs-triage
702focal_linux-raspi2: ignored (replaced by linux-raspi)
703jammy_linux-raspi2: DNE
704kinetic_linux-raspi2: DNE
705
706Patches_linux-raspi2-5.3:
707upstream_linux-raspi2-5.3: ignored (superseded by linux-raspi2-5.4)
708trusty_linux-raspi2-5.3: DNE
709xenial_linux-raspi2-5.3: DNE
710bionic_linux-raspi2-5.3: ignored (superseded by linux-raspi-5.4)
711focal_linux-raspi2-5.3: DNE
712jammy_linux-raspi2-5.3: DNE
713kinetic_linux-raspi2-5.3: DNE
714
715Patches_linux-raspi-5.4:
716upstream_linux-raspi-5.4: needs-triage
717trusty_linux-raspi-5.4: DNE
718xenial_linux-raspi-5.4: DNE
719bionic_linux-raspi-5.4: needs-triage
720focal_linux-raspi-5.4: DNE
721jammy_linux-raspi-5.4: DNE
722kinetic_linux-raspi-5.4: DNE
723
724Patches_linux-riscv:
725upstream_linux-riscv: needs-triage
726trusty_linux-riscv: DNE
727xenial_linux-riscv: DNE
728bionic_linux-riscv: DNE
729focal_linux-riscv: ignored (superseded by linux-riscv-5.8)
730jammy_linux-riscv: needs-triage
731kinetic_linux-riscv: needs-triage
732devel_linux-riscv: needs-triage
733
734Patches_linux-riscv-5.8:
735upstream_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11)
736trusty_linux-riscv-5.8: DNE
737xenial_linux-riscv-5.8: DNE
738bionic_linux-riscv-5.8: DNE
739focal_linux-riscv-5.8: ignored (superseded by linux-riscv-5.11)
740jammy_linux-riscv-5.8: DNE
741kinetic_linux-riscv-5.8: DNE
742
743Patches_linux-riscv-5.11:
744upstream_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13)
745trusty_linux-riscv-5.11: DNE
746xenial_linux-riscv-5.11: DNE
747bionic_linux-riscv-5.11: DNE
748focal_linux-riscv-5.11: ignored (superseded by linux-riscv-5.13)
749jammy_linux-riscv-5.11: DNE
750kinetic_linux-riscv-5.11: DNE
751
752Patches_linux-snapdragon:
753upstream_linux-snapdragon: needs-triage
754trusty_linux-snapdragon: DNE
755xenial_linux-snapdragon: ignored (end of standard support)
756bionic_linux-snapdragon: needs-triage
757focal_linux-snapdragon: DNE
758jammy_linux-snapdragon: DNE
759kinetic_linux-snapdragon: DNE
diff --git a/active/CVE-2022-23467 b/active/CVE-2022-23467
0new file mode 100644760new file mode 100644
index 0000000..d5b7d96
--- /dev/null
+++ b/active/CVE-2022-23467
@@ -0,0 +1,33 @@
1Candidate: CVE-2022-23467
2PublicDate: 2022-12-06
3References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23467
5 https://github.com/openrazer/openrazer/security/advisories/GHSA-39hg-jvc9-fg7h
6 https://github.com/openrazer/openrazer/commit/33aa7f07d54ae066f201c6d298cb4a2181cb90e6
7Description:
8 OpenRazer is an open source driver and user-space daemon to control Razer
9 device lighting and other features on GNU/Linux. Using a modified USB
10 device an attacker can leak stack addresses of the
11 `razer_attr_read_dpi_stages`, potentially bypassing KASLR. To exploit this
12 vulnerability an attacker would need to access to a users keyboard or mouse
13 or would need to convince a user to use a modified device. The issue has
14 been patched in v3.5.1. Users are advised to upgrade and should be reminded
15 not to plug in unknown USB devices.
16Ubuntu-Description:
17Notes:
18Mitigation:
19Bugs:
20Priority: low
21Discovered-by:
22Assigned-to:
23CVSS:
24
25Patches_openrazer:
26upstream_openrazer: needs-triage
27trusty_openrazer: ignored (out of standard support)
28xenial_openrazer: ignored (out of standard support)
29bionic_openrazer: DNE
30focal_openrazer: needs-triage
31jammy_openrazer: needs-triage
32kinetic_openrazer: needs-triage
33devel_openrazer: needs-triage
diff --git a/active/CVE-2022-37325 b/active/CVE-2022-37325
0new file mode 10064434new file mode 100644
index 0000000..6a034a4
--- /dev/null
+++ b/active/CVE-2022-37325
@@ -0,0 +1,28 @@
1Candidate: CVE-2022-37325
2PublicDate: 2022-12-06
3References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325
5 https://downloads.asterisk.org/pub/security/AST-2022-007.html
6Description:
7 In Sangoma Asterisk through 16.28.0, 17.x and 18.x through 18.14.0, and
8 19.x through 19.6.0, an incoming Setup message to
9 addons/ooh323c/src/ooq931.c with a malformed Calling or Called Party IE can
10 cause a crash.
11Ubuntu-Description:
12Notes:
13Mitigation:
14Bugs:
15Priority: medium
16Discovered-by:
17Assigned-to:
18CVSS:
19
20Patches_asterisk:
21upstream_asterisk: needs-triage
22trusty_asterisk: ignored (out of standard support)
23xenial_asterisk: ignored (out of standard support)
24bionic_asterisk: needs-triage
25focal_asterisk: needs-triage
26jammy_asterisk: needs-triage
27kinetic_asterisk: needs-triage
28devel_asterisk: needs-triage
diff --git a/active/CVE-2022-38533 b/active/CVE-2022-38533
index c8908b2..52f923d 100644
--- a/active/CVE-2022-38533
+++ b/active/CVE-2022-38533
@@ -1,7 +1,9 @@
1PublicDateAtUSN: 2022-08-26 00:15:00 UTC
1Candidate: CVE-2022-385332Candidate: CVE-2022-38533
2PublicDate: 2022-08-26 00:15:00 UTC3PublicDate: 2022-08-26 00:15:00 UTC
3References:4References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-385335 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38533
6 https://ubuntu.com/security/notices/USN-5762-1
5Description:7Description:
6 In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error8 In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error
7 function bfd_getl32 when called from the strip_main function in strip-new9 function bfd_getl32 when called from the strip_main function in strip-new
@@ -23,11 +25,11 @@ Patches_binutils:
23 upstream: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ef186fe54aa6d281a3ff8a9528417e5cc614c79725 upstream: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ef186fe54aa6d281a3ff8a9528417e5cc614c797
24upstream_binutils: pending (2.40)26upstream_binutils: pending (2.40)
25trusty/esm_binutils: needed27trusty/esm_binutils: needed
26esm-infra/xenial_binutils: needed28esm-infra/xenial_binutils: released (2.26.1-1ubuntu1~16.04.8+esm5)
27trusty_binutils: ignored (out of standard support)29trusty_binutils: ignored (out of standard support)
28xenial_binutils: ignored (out of standard support)30xenial_binutils: ignored (out of standard support)
29bionic_binutils: needed31bionic_binutils: released (2.30-21ubuntu1~18.04.8)
30focal_binutils: needed32focal_binutils: released (2.34-6ubuntu1.4)
31jammy_binutils: needed33jammy_binutils: released (2.38-4ubuntu2.1)
32kinetic_binutils: needed34kinetic_binutils: released (2.39-3ubuntu1.1)
33devel_binutils: needed35devel_binutils: needed
diff --git a/active/CVE-2022-40303 b/active/CVE-2022-40303
index c1766be..e153bb7 100644
--- a/active/CVE-2022-40303
+++ b/active/CVE-2022-40303
@@ -4,6 +4,7 @@ PublicDate: 2022-11-23 00:15:00 UTC
4References:4References:
5 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-403035 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40303
6 https://ubuntu.com/security/notices/USN-5760-16 https://ubuntu.com/security/notices/USN-5760-1
7 https://ubuntu.com/security/notices/USN-5760-2
7Description:8Description:
8 An issue was discovered in libxml2 before 2.10.3. When parsing a9 An issue was discovered in libxml2 before 2.10.3. When parsing a
9 multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled,10 multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled,
@@ -24,7 +25,7 @@ CVSS:
24Patches_libxml2:25Patches_libxml2:
25 upstream: https://gitlab.gnome.org/GNOME/libxml2/-/commit/c846986356fc149915a74972bf198abc266bc2c026 upstream: https://gitlab.gnome.org/GNOME/libxml2/-/commit/c846986356fc149915a74972bf198abc266bc2c0
26upstream_libxml2: released (2.10.3)27upstream_libxml2: released (2.10.3)
27esm-infra/xenial_libxml2: needed28esm-infra/xenial_libxml2: released (2.9.3+dfsg1-1ubuntu0.7+esm4)
28trusty_libxml2: ignored (out of standard support)29trusty_libxml2: ignored (out of standard support)
29xenial_libxml2: ignored (out of standard support)30xenial_libxml2: ignored (out of standard support)
30bionic_libxml2: released (2.9.4+dfsg1-6.1ubuntu1.8)31bionic_libxml2: released (2.9.4+dfsg1-6.1ubuntu1.8)
@@ -32,4 +33,4 @@ focal_libxml2: released (2.9.10+dfsg-5ubuntu0.20.04.5)
32jammy_libxml2: released (2.9.13+dfsg-1ubuntu0.2)33jammy_libxml2: released (2.9.13+dfsg-1ubuntu0.2)
33kinetic_libxml2: released (2.9.14+dfsg-1ubuntu0.1)34kinetic_libxml2: released (2.9.14+dfsg-1ubuntu0.1)
34devel_libxml2: needed35devel_libxml2: needed
35trusty/esm_libxml2: needed36trusty/esm_libxml2: released (2.9.1+dfsg1-3ubuntu4.13+esm4)
diff --git a/active/CVE-2022-40304 b/active/CVE-2022-40304
index d2506f2..8373f58 100644
--- a/active/CVE-2022-40304
+++ b/active/CVE-2022-40304
@@ -4,6 +4,7 @@ PublicDate: 2022-11-23 18:15:00 UTC
4References:4References:
5 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-403045 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40304
6 https://ubuntu.com/security/notices/USN-5760-16 https://ubuntu.com/security/notices/USN-5760-1
7 https://ubuntu.com/security/notices/USN-5760-2
7Description:8Description:
8 An issue was discovered in libxml2 before 2.10.3. Certain invalid XML9 An issue was discovered in libxml2 before 2.10.3. Certain invalid XML
9 entity definitions can corrupt a hash table key, potentially leading to10 entity definitions can corrupt a hash table key, potentially leading to
@@ -22,7 +23,7 @@ CVSS:
22Patches_libxml2:23Patches_libxml2:
23 upstream: https://gitlab.gnome.org/GNOME/libxml2/-/commit/1b41ec4e9433b05bb0376be4725804c54ef1d80b24 upstream: https://gitlab.gnome.org/GNOME/libxml2/-/commit/1b41ec4e9433b05bb0376be4725804c54ef1d80b
24upstream_libxml2: released (2.10.3)25upstream_libxml2: released (2.10.3)
25esm-infra/xenial_libxml2: needed26esm-infra/xenial_libxml2: released (2.9.3+dfsg1-1ubuntu0.7+esm4)
26trusty_libxml2: ignored (out of standard support)27trusty_libxml2: ignored (out of standard support)
27xenial_libxml2: ignored (out of standard support)28xenial_libxml2: ignored (out of standard support)
28bionic_libxml2: released (2.9.4+dfsg1-6.1ubuntu1.8)29bionic_libxml2: released (2.9.4+dfsg1-6.1ubuntu1.8)
@@ -30,4 +31,4 @@ focal_libxml2: released (2.9.10+dfsg-5ubuntu0.20.04.5)
30jammy_libxml2: released (2.9.13+dfsg-1ubuntu0.2)31jammy_libxml2: released (2.9.13+dfsg-1ubuntu0.2)
31kinetic_libxml2: released (2.9.14+dfsg-1ubuntu0.1)32kinetic_libxml2: released (2.9.14+dfsg-1ubuntu0.1)
32devel_libxml2: needs-triage33devel_libxml2: needs-triage
33trusty/esm_libxml2: needed34trusty/esm_libxml2: released (2.9.1+dfsg1-3ubuntu4.13+esm4)
diff --git a/active/CVE-2022-4170 b/active/CVE-2022-4170
34new file mode 10064435new file mode 100644
index 0000000..eef4d0d
--- /dev/null
+++ b/active/CVE-2022-4170
@@ -0,0 +1,27 @@
1Candidate: CVE-2022-4170
2PublicDate: 2022-12-06
3References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4170
5 https://www.openwall.com/lists/oss-security/2022/12/05/1
6 http://cvs.schmorp.de/rxvt-unicode/src/perl/background?r1=1.105&r2=1.109
7Description:
8 [Unknown description]
9Ubuntu-Description:
10Notes:
11Mitigation:
12Bugs:
13 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025489
14Priority: medium
15Discovered-by:
16Assigned-to:
17CVSS:
18
19Patches_rxvt-unicode:
20upstream_rxvt-unicode: needs-triage
21trusty_rxvt-unicode: ignored (out of standard support)
22xenial_rxvt-unicode: ignored (out of standard support)
23bionic_rxvt-unicode: needs-triage
24focal_rxvt-unicode: needs-triage
25jammy_rxvt-unicode: needs-triage
26kinetic_rxvt-unicode: needs-triage
27devel_rxvt-unicode: needs-triage
diff --git a/active/CVE-2022-42705 b/active/CVE-2022-42705
0new file mode 10064428new file mode 100644
index 0000000..89a63e2
--- /dev/null
+++ b/active/CVE-2022-42705
@@ -0,0 +1,29 @@
1Candidate: CVE-2022-42705
2PublicDate: 2022-12-06
3References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705
5 https://downloads.asterisk.org/pub/security/AST-2022-008.html
6Description:
7 A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14,
8 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to
9 crash Asterisk (denial of service) by performing activity on a subscription
10 via a reliable transport at the same time that Asterisk is also performing
11 activity on that subscription.
12Ubuntu-Description:
13Notes:
14Mitigation:
15Bugs:
16Priority: medium
17Discovered-by:
18Assigned-to:
19CVSS:
20
21Patches_asterisk:
22upstream_asterisk: needs-triage
23trusty_asterisk: ignored (out of standard support)
24xenial_asterisk: ignored (out of standard support)
25bionic_asterisk: needs-triage
26focal_asterisk: needs-triage
27jammy_asterisk: needs-triage
28kinetic_asterisk: needs-triage
29devel_asterisk: needs-triage
diff --git a/active/CVE-2022-42706 b/active/CVE-2022-42706
0new file mode 10064430new file mode 100644
index 0000000..65cc814
--- /dev/null
+++ b/active/CVE-2022-42706
@@ -0,0 +1,29 @@
1Candidate: CVE-2022-42706
2PublicDate: 2022-12-06
3References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706
5 https://downloads.asterisk.org/pub/security/AST-2022-009.html
6Description:
7 An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18
8 through 18.14, 19 through 19.6, and certified through 18.9-cert1.
9 GetConfig, via Asterisk Manager Interface, allows a connected application
10 to access files outside of the asterisk configuration directory, aka
11 Directory Traversal.
12Ubuntu-Description:
13Notes:
14Mitigation:
15Bugs:
16Priority: medium
17Discovered-by:
18Assigned-to:
19CVSS:
20
21Patches_asterisk:
22upstream_asterisk: needs-triage
23trusty_asterisk: ignored (out of standard support)
24xenial_asterisk: ignored (out of standard support)
25bionic_asterisk: needs-triage
26focal_asterisk: needs-triage
27jammy_asterisk: needs-triage
28kinetic_asterisk: needs-triage
29devel_asterisk: needs-triage
diff --git a/active/CVE-2022-42919 b/active/CVE-2022-42919
index e25c604..c6b41d6 100644
--- a/active/CVE-2022-42919
+++ b/active/CVE-2022-42919
@@ -122,4 +122,4 @@ bionic_python3.11: DNE
122focal_python3.11: DNE122focal_python3.11: DNE
123jammy_python3.11: needed123jammy_python3.11: needed
124kinetic_python3.11: needed124kinetic_python3.11: needed
125devel_python3.11: needed125devel_python3.11: not-affected (3.11.0-3)
diff --git a/active/CVE-2022-4292 b/active/CVE-2022-4292
126new file mode 100644126new file mode 100644
index 0000000..f641a65
--- /dev/null
+++ b/active/CVE-2022-4292
@@ -0,0 +1,29 @@
1Candidate: CVE-2022-4292
2PublicDate: 2022-12-06
3References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4292
5 https://huntr.dev/bounties/da3d4c47-e57a-451e-993d-9df0ed31f57b
6 https://github.com/vim/vim/commit/c3d27ada14acd02db357f2d16347acc22cb17e93 (v9.0.0882)
7 https://github.com/vim/vim/commit/c3d27ada14acd02db357f2d16347acc22cb17e93
8Description:
9 Use After Free in GitHub repository vim/vim prior to 9.0.0882.
10Ubuntu-Description:
11Notes:
12Mitigation:
13Bugs:
14Priority: low
15Discovered-by:
16Assigned-to:
17CVSS:
18
19Patches_vim:
20upstream_vim: needs-triage
21esm-infra/xenial_vim: needs-triage
22trusty_vim: ignored (out of standard support)
23xenial_vim: ignored (out of standard support)
24bionic_vim: needs-triage
25focal_vim: needs-triage
26jammy_vim: needs-triage
27kinetic_vim: needs-triage
28trusty/esm_vim: needs-triage
29devel_vim: needs-triage
diff --git a/active/CVE-2022-4293 b/active/CVE-2022-4293
0new file mode 10064430new file mode 100644
index 0000000..9a6dab6
--- /dev/null
+++ b/active/CVE-2022-4293
@@ -0,0 +1,30 @@
1Candidate: CVE-2022-4293
2PublicDate: 2022-12-06
3References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4293
5 https://huntr.dev/bounties/385a835f-6e33-4d00-acce-ac99f3939143
6 https://github.com/vim/vim/commit/cdef1cefa2a440911c727558562f83ed9b00e16b (v9.0.0804)
7 https://github.com/vim/vim/commit/cdef1cefa2a440911c727558562f83ed9b00e16b
8Description:
9 Floating Point Comparison with Incorrect Operator in GitHub repository
10 vim/vim prior to 9.0.0804.
11Ubuntu-Description:
12Notes:
13Mitigation:
14Bugs:
15Priority: low
16Discovered-by:
17Assigned-to:
18CVSS:
19
20Patches_vim:
21upstream_vim: released (2:9.0.0813-1)
22esm-infra/xenial_vim: needs-triage
23trusty_vim: ignored (out of standard support)
24xenial_vim: ignored (out of standard support)
25bionic_vim: needs-triage
26focal_vim: needs-triage
27jammy_vim: needs-triage
28kinetic_vim: needs-triage
29trusty/esm_vim: needs-triage
30devel_vim: needs-triage
diff --git a/active/CVE-2022-43497 b/active/CVE-2022-43497
0new file mode 10064431new file mode 100644
index 0000000..886976d
--- /dev/null
+++ b/active/CVE-2022-43497
@@ -0,0 +1,28 @@
1Candidate: CVE-2022-43497
2PublicDate: 2022-12-06
3References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43497
5 https://wordpress.org/news/2022/10/wordpress-6-0-3-security-release/
6 https://jvn.jp/en/jp/JVN09409909/index.html
7 https://wordpress.org/download/
8Description:
9 Cross-site scripting vulnerability in WordPress versions prior to 6.0.3
10 allows a remote unauthenticated attacker to inject an arbitrary script .
11Ubuntu-Description:
12Notes:
13Mitigation:
14Bugs:
15Priority: medium
16Discovered-by:
17Assigned-to:
18CVSS:
19
20Patches_wordpress:
21upstream_wordpress: needs-triage
22trusty_wordpress: ignored (out of standard support)
23xenial_wordpress: ignored (out of standard support)
24bionic_wordpress: needs-triage
25focal_wordpress: needs-triage
26jammy_wordpress: needs-triage
27kinetic_wordpress: needs-triage
28devel_wordpress: needs-triage
diff --git a/active/CVE-2022-43500 b/active/CVE-2022-43500
0new file mode 10064429new file mode 100644
index 0000000..f5064e8
--- /dev/null
+++ b/active/CVE-2022-43500
@@ -0,0 +1,28 @@
1Candidate: CVE-2022-43500
2PublicDate: 2022-12-06
3References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43500
5 https://wordpress.org/news/2022/10/wordpress-6-0-3-security-release/
6 https://jvn.jp/en/jp/JVN09409909/index.html
7 https://wordpress.org/download/
8Description:
9 Cross-site scripting vulnerability in WordPress versions prior to 6.0.3
10 allows a remote unauthenticated attacker to inject an arbitrary script .
11Ubuntu-Description:
12Notes:
13Mitigation:
14Bugs:
15Priority: medium
16Discovered-by:
17Assigned-to:
18CVSS:
19
20Patches_wordpress:
21upstream_wordpress: needs-triage
22trusty_wordpress: ignored (out of standard support)
23xenial_wordpress: ignored (out of standard support)
24bionic_wordpress: needs-triage
25focal_wordpress: needs-triage
26jammy_wordpress: needs-triage
27kinetic_wordpress: needs-triage
28devel_wordpress: needs-triage
diff --git a/active/CVE-2022-43504 b/active/CVE-2022-43504
0new file mode 10064429new file mode 100644
index 0000000..fceca9e
--- /dev/null
+++ b/active/CVE-2022-43504
@@ -0,0 +1,29 @@
1Candidate: CVE-2022-43504
2PublicDate: 2022-12-06
3References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43504
5 https://wordpress.org/news/2022/10/wordpress-6-0-3-security-release/
6 https://jvn.jp/en/jp/JVN09409909/index.html
7 https://wordpress.org/download/
8Description:
9 Improper authentication vulnerability in WordPress versions prior to 6.0.3
10 allows a remote unauthenticated attacker to obtain the email address of the
11 user who posted a blog using the WordPress Post by Email Feature.
12Ubuntu-Description:
13Notes:
14Mitigation:
15Bugs:
16Priority: low
17Discovered-by:
18Assigned-to:
19CVSS:
20
21Patches_wordpress:
22upstream_wordpress: needs-triage
23trusty_wordpress: ignored (out of standard support)
24xenial_wordpress: ignored (out of standard support)
25bionic_wordpress: needs-triage
26focal_wordpress: needs-triage
27jammy_wordpress: needs-triage
28kinetic_wordpress: needs-triage
29devel_wordpress: needs-triage
diff --git a/active/CVE-2022-43515 b/active/CVE-2022-43515
0new file mode 10064430new file mode 100644
index 0000000..63eaca3
--- /dev/null
+++ b/active/CVE-2022-43515
@@ -0,0 +1,31 @@
1Candidate: CVE-2022-43515
2PublicDate: 2022-12-06
3References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43515
5 https://support.zabbix.com/browse/ZBXSEC-125
6Description:
7 Zabbix Frontend provides a feature that allows admins to maintain the
8 installation and ensure that only certain IP addresses can access it. In
9 this way, any user will not be able to access the Zabbix Frontend while it
10 is being maintained and possible sensitive data will be prevented from
11 being disclosed. An attacker can bypass this protection and access the
12 instance using IP address not listed in the defined range.
13Ubuntu-Description:
14Notes:
15Mitigation:
16Bugs:
17Priority: medium
18Discovered-by:
19Assigned-to:
20CVSS:
21
22Patches_zabbix:
23upstream_zabbix: needs-triage
24trusty_zabbix: ignored (out of standard support)
25xenial_zabbix: ignored (out of standard support)
26bionic_zabbix: needs-triage
27focal_zabbix: needs-triage
28jammy_zabbix: needs-triage
29kinetic_zabbix: needs-triage
30trusty/esm_zabbix: needs-triage
31devel_zabbix: needs-triage
diff --git a/active/CVE-2022-45283 b/active/CVE-2022-45283
0new file mode 10064432new file mode 100644
index 0000000..d6b9b1f
--- /dev/null
+++ b/active/CVE-2022-45283
@@ -0,0 +1,27 @@
1Candidate: CVE-2022-45283
2PublicDate: 2022-12-06
3References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45283
5 https://github.com/gpac/gpac/issues/2295
6Description:
7 GPAC MP4box v2.0.0 was discovered to contain a stack overflow in the
8 smil_parse_time_list parameter at /scenegraph/svg_attributes.c.
9Ubuntu-Description:
10Notes:
11Mitigation:
12Bugs:
13Priority: medium
14Discovered-by:
15Assigned-to:
16CVSS:
17
18Patches_gpac:
19upstream_gpac: needs-triage
20trusty_gpac: ignored (out of standard support)
21xenial_gpac: ignored (out of standard support)
22bionic_gpac: needs-triage
23focal_gpac: needs-triage
24jammy_gpac: needs-triage
25kinetic_gpac: needs-triage
26trusty/esm_gpac: needs-triage
27devel_gpac: needs-triage
diff --git a/active/CVE-2022-46169 b/active/CVE-2022-46169
0new file mode 10064428new file mode 100644
index 0000000..f5b58f4
--- /dev/null
+++ b/active/CVE-2022-46169
@@ -0,0 +1,78 @@
1Candidate: CVE-2022-46169
2PublicDate: 2022-12-06
3References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46169
5 https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf
6 https://github.com/Cacti/cacti/commit/b43f13ae7f1e6bfe4e8e56a80a7cd867cf2db52b
7 https://github.com/Cacti/cacti/commit/a8d59e8fa5f0054aa9c6981b1cbe30ef0e2a0ec9
8 https://github.com/Cacti/cacti/commit/7f0e16312dd5ce20f93744ef8b9c3b0f1ece2216
9Description:
10 Cacti is an open source platform which provides a robust and extensible
11 operational monitoring and fault management framework for users. In
12 affected versions a command injection vulnerability allows an
13 unauthenticated user to execute arbitrary code on a server running Cacti,
14 if a specific data source was selected for any monitored device. The
15 vulnerability resides in the `remote_agent.php` file. This file can be
16 accessed without authentication. This function retrieves the IP address of
17 the client via `get_client_addr` and resolves this IP address to the
18 corresponding hostname via `gethostbyaddr`. After this, it is verified that
19 an entry within the `poller` table exists, where the hostname corresponds
20 to the resolved hostname. If such an entry was found, the function returns
21 `true` and the client is authorized. This authorization can be bypassed due
22 to the implementation of the `get_client_addr` function. The function is
23 defined in the file `lib/functions.php` and checks serval `$_SERVER`
24 variables to determine the IP address of the client. The variables
25 beginning with `HTTP_` can be arbitrarily set by an attacker. Since there
26 is a default entry in the `poller` table with the hostname of the server
27 running Cacti, an attacker can bypass the authentication e.g. by providing
28 the header `Forwarded-For: <TARGETIP>`. This way the function
29 `get_client_addr` returns the IP address of the server running Cacti. The
30 following call to `gethostbyaddr` will resolve this IP address to the
31 hostname of the server, which will pass the `poller` hostname check because
32 of the default entry. After the authorization of the `remote_agent.php`
33 file is bypassed, an attacker can trigger different actions. One of these
34 actions is called `polldata`. The called function `poll_for_data` retrieves
35 a few request parameters and loads the corresponding `poller_item` entries
36 from the database. If the `action` of a `poller_item` equals
37 `POLLER_ACTION_SCRIPT_PHP`, the function `proc_open` is used to execute a
38 PHP script. The attacker-controlled parameter `$poller_id` is retrieved via
39 the function `get_nfilter_request_var`, which allows arbitrary strings.
40 This variable is later inserted into the string passed to `proc_open`,
41 which leads to a command injection vulnerability. By e.g. providing the
42 `poller_id=;id` the `id` command is executed. In order to reach the
43 vulnerable call, the attacker must provide a `host_id` and `local_data_id`,
44 where the `action` of the corresponding `poller_item` is set to
45 `POLLER_ACTION_SCRIPT_PHP`. Both of these ids (`host_id` and
46 `local_data_id`) can easily be bruteforced. The only requirement is that a
47 `poller_item` with an `POLLER_ACTION_SCRIPT_PHP` action exists. This is
48 very likely on a productive instance because this action is added by some
49 predefined templates like `Device - Uptime` or `Device - Polling Time`.
50 This command injection vulnerability allows an unauthenticated user to
51 execute arbitrary commands if a `poller_item` with the `action` type
52 `POLLER_ACTION_SCRIPT_PHP` (`2`) is configured. The authorization bypass
53 should be prevented by not allowing an attacker to make `get_client_addr`
54 (file `lib/functions.php`) return an arbitrary IP address. This could be
55 done by not honoring the `HTTP_...` `$_SERVER` variables. If these should
56 be kept for compatibility reasons it should at least be prevented to fake
57 the IP address of the server running Cacti. This vulnerability has been
58 addressed in both the 1.2.x and 1.3.x release branches with `1.2.23` being
59 the first release containing the patch.
60Ubuntu-Description:
61Notes:
62Mitigation:
63Bugs:
64Priority: medium
65Discovered-by:
66Assigned-to:
67CVSS:
68
69Patches_cacti:
70upstream_cacti: needs-triage
71trusty_cacti: ignored (out of standard support)
72xenial_cacti: ignored (out of standard support)
73bionic_cacti: needs-triage
74focal_cacti: needs-triage
75jammy_cacti: needs-triage
76kinetic_cacti: needs-triage
77trusty/esm_cacti: needs-triage
78devel_cacti: needs-triage
diff --git a/check-cves.log b/check-cves.log
index 32036f4..7d18d5c 100644
--- a/check-cves.log
+++ b/check-cves.log
@@ -7258,3 +7258,5 @@
72582022-12-01 13:34:56 UTC - 1 added, 0 ignored, 0 skipped, 1 total - files: ['cve-feed.json']72582022-12-01 13:34:56 UTC - 1 added, 0 ignored, 0 skipped, 1 total - files: ['cve-feed.json']
72592022-12-05 02:53:35 UTC - 7 added, 366 ignored, 0 skipped, 373 total - files: ['nvdcve-1.1-2004.json', 'nvdcve-1.1-2005.json', 'nvdcve-1.1-2006.json', 'nvdcve-1.1-2007.json', 'nvdcve-1.1-2008.json', 'nvdcve-1.1-2009.json', 'nvdcve-1.1-2010.json', 'nvdcve-1.1-2011.json', 'nvdcve-1.1-2012.json', 'nvdcve-1.1-2013.json', 'nvdcve-1.1-2014.json', 'nvdcve-1.1-2015.json', 'nvdcve-1.1-2016.json', 'nvdcve-1.1-2017.json', 'nvdcve-1.1-2018.json', 'nvdcve-1.1-2019.json', 'nvdcve-1.1-2020.json', 'nvdcve-1.1-2021.json', 'nvdcve-1.1-2022.json', 'nvdcve-1.1-recent.json']72592022-12-05 02:53:35 UTC - 7 added, 366 ignored, 0 skipped, 373 total - files: ['nvdcve-1.1-2004.json', 'nvdcve-1.1-2005.json', 'nvdcve-1.1-2006.json', 'nvdcve-1.1-2007.json', 'nvdcve-1.1-2008.json', 'nvdcve-1.1-2009.json', 'nvdcve-1.1-2010.json', 'nvdcve-1.1-2011.json', 'nvdcve-1.1-2012.json', 'nvdcve-1.1-2013.json', 'nvdcve-1.1-2014.json', 'nvdcve-1.1-2015.json', 'nvdcve-1.1-2016.json', 'nvdcve-1.1-2017.json', 'nvdcve-1.1-2018.json', 'nvdcve-1.1-2019.json', 'nvdcve-1.1-2020.json', 'nvdcve-1.1-2021.json', 'nvdcve-1.1-2022.json', 'nvdcve-1.1-recent.json']
72602022-12-05 03:24:07 UTC - 22 added, 1 ignored, 0 skipped, 23 total - files: ['debian-import_npzhqw40.json']72602022-12-05 03:24:07 UTC - 22 added, 1 ignored, 0 skipped, 23 total - files: ['debian-import_npzhqw40.json']
72612022-12-06 04:29:18 UTC - 13 added, 87 ignored, 0 skipped, 100 total - files: ['nvdcve-1.1-recent.json']
72622022-12-06 04:42:20 UTC - 5 added, 0 ignored, 0 skipped, 5 total - files: ['debian-import_d8b4xdcy.json']
diff --git a/ignored/not-for-us.txt b/ignored/not-for-us.txt
index f9115c7..4b2ad36 100644
--- a/ignored/not-for-us.txt
+++ b/ignored/not-for-us.txt
@@ -138543,3 +138543,90 @@ CVE-2021-37533 # Apache Commons Net
138543CVE-2022-4273 # SourceCodester Human Resource Management System138543CVE-2022-4273 # SourceCodester Human Resource Management System
138544CVE-2022-4272 # FeMiner wms138544CVE-2022-4272 # FeMiner wms
138545CVE-2022-45797 # Trend Micro138545CVE-2022-45797 # Trend Micro
138546CVE-2022-4173 # Avast and AVG Antivirus
138547CVE-2022-44009 # StackStorm
138548CVE-2022-40918 # firmware lewei_cam binary
138549CVE-2022-38337 # MobaXterm
138550CVE-2022-38336 # MobaXterm
138551CVE-2021-39434 # ZKTeco ZKTime
138552CVE-2022-46464 # ConcreteCMS
138553CVE-2022-45990 # Ecommerce-Website
138554CVE-2022-45769 # ClicShopping_V3
138555CVE-2022-45020 # Rukovoditel
138556CVE-2022-45019 # SLiMS
138557CVE-2022-43706 # StackStorm
138558CVE-2022-45912 # Zimbra Collaboration
138559CVE-2022-43557 # BD BodyGuard infusion pumps
138560CVE-2022-43556 # Concrete CMS
138561CVE-2022-43553 # EdgeRouters
138562CVE-2022-43549 # Veeam Backup for Google Cloud
138563CVE-2022-40259 # AMI MegaRAC
138564CVE-2022-40242 # AMI MegaRAC
138565CVE-2022-35259 # Endpoint Manager
138566CVE-2022-35258 # Ivanti Connect Secure
138567CVE-2022-35254 # Ivanti Connect Secure
138568CVE-2022-2827 # AMI MegaRAC
138569CVE-2022-27773 # Ivanti EPM
138570CVE-2022-23143 # ZTE
138571CVE-2022-46164 # NodeBB
138572CVE-2022-45481 # Lazy Mouse
138573CVE-2022-45479 # PC Keyboard
138574CVE-2022-44039 # Franklin Fueling System FFS Colibri
138575CVE-2022-37783 # All Craft CMS
138576CVE-2021-34181 # TomExam
138577CVE-2022-45771 # Pwndoc
138578CVE-2022-43097 # Phpgurukul
138579CVE-2022-3926 # WordPress plugin
138580CVE-2022-3909 # WordPress plugin
138581CVE-2022-3907 # WordPress plugin
138582CVE-2022-3892 # WordPress plugin
138583CVE-2022-3858 # WordPress plugin
138584CVE-2022-3856 # WordPress plugin
138585CVE-2022-3846 # WordPress theme
138586CVE-2022-3838 # WordPress plugin
138587CVE-2022-3837 # WordPress plugin
138588CVE-2022-3830 # WordPress plugin
138589CVE-2022-3694 # WordPress plugin
138590CVE-2022-3677 # WordPress plugin
138591CVE-2022-3426 # WordPress plugin
138592CVE-2022-3249 # WordPress plugin
138593CVE-2022-1540 # WordPress plugin
138594CVE-2022-45478 # Telepad
138595CVE-2022-45477 # Telepad
138596CVE-2022-45315 # Mikrotik
138597CVE-2022-45313 # Mikrotik
138598CVE-2022-32634 # MediaTek
138599CVE-2022-32633 # MediaTek
138600CVE-2022-32632 # MediaTek
138601CVE-2022-32631 # MediaTek
138602CVE-2022-32630 # MediaTek
138603CVE-2022-32629 # MediaTek
138604CVE-2022-32628 # MediaTek
138605CVE-2022-32626 # MediaTek
138606CVE-2022-32625 # MediaTek
138607CVE-2022-32624 # MediaTek
138608CVE-2022-32622 # MediaTek
138609CVE-2022-32621 # MediaTek
138610CVE-2022-32620 # MediaTek
138611CVE-2022-32619 # MediaTek
138612CVE-2022-32598 # MediaTek
138613CVE-2022-32597 # MediaTek
138614CVE-2022-32596 # MediaTek
138615CVE-2022-32594 # MediaTek
138616CVE-2022-45046 # Apache Camel
138617CVE-2022-45824 # WordPress plugin
138618CVE-2022-45822 # WordPress plugin
138619CVE-2022-4282 # SpringBootCMS
138620CVE-2022-4281 # Facepay
138621CVE-2022-43499 # SHIRASAGI
138622CVE-2022-43487 # Salon booking system
138623CVE-2022-43484 # TERASOLUNA
138624CVE-2022-43479 # SHIRASAGI
138625CVE-2022-43470 # +F software
138626CVE-2022-43442 # +F software
138627CVE-2022-42496 # Nako3edit
138628CVE-2022-41830 # Kyocera Document Solutions
138629CVE-2022-41807 # Kyocera Document Solutions
138630CVE-2022-41798 # Kyocera Document Solutions
138631CVE-2022-41777 # Nako3edit
138632CVE-2022-41642 # Nako3edit
diff --git a/retired/CVE-2022-43516 b/retired/CVE-2022-43516
138546new file mode 100644138633new file mode 100644
index 0000000..c2f735d
--- /dev/null
+++ b/retired/CVE-2022-43516
@@ -0,0 +1,29 @@
1Candidate: CVE-2022-43516
2PublicDate: 2022-12-06
3References:
4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43516
5 https://support.zabbix.com/browse/ZBX-22002
6Description:
7 A Firewall Rule which allows all incoming TCP connections to all programs
8 from any source and to all ports is created in Windows Firewall after
9 Zabbix agent installation (MSI)
10Ubuntu-Description:
11Notes:
12 amurray| appears to only affect zabbix on Windows
13Mitigation:
14Bugs:
15Priority: negligible
16Discovered-by:
17Assigned-to:
18CVSS:
19
20Patches_zabbix:
21upstream_zabbix: needs-triage
22trusty_zabbix: ignored (out of standard support)
23xenial_zabbix: ignored (out of standard support)
24bionic_zabbix: not-affected (Windows only)
25focal_zabbix: not-affected (Windows only)
26jammy_zabbix: not-affected (Windows only)
27kinetic_zabbix: not-affected (Windows only)
28trusty/esm_zabbix: not-affected (Windows only)
29devel_zabbix: not-affected (Windows only)
diff --git a/scripts/check-cves-mode.el b/scripts/check-cves-mode.el
index 92e334b..1f02b26 100644
--- a/scripts/check-cves-mode.el
+++ b/scripts/check-cves-mode.el
@@ -121,7 +121,11 @@ A negative argument means move forward that many keywords."
121121
122(defvar check-cves-mode-source-packages122(defvar check-cves-mode-source-packages
123 (split-string123 (split-string
124 (shell-command-to-string "source ~/.ubuntu-cve-tracker.conf; cat $packages_mirror/sources")))124 (shell-command-to-string "umt grep '.*'")))
125
126(defvar check-cves-mode-binary-packages
127 (split-string
128 (shell-command-to-string "dpkg-query --show --showformat '${Package}\n'")))
125129
126(defun check-cves-mode-prompt-for-packages (&optional chosen)130(defun check-cves-mode-prompt-for-packages (&optional chosen)
127 "Prompt user for a list of source packages excluding CHOSEN."131 "Prompt user for a list of source packages excluding CHOSEN."
@@ -253,6 +257,8 @@ A negative argument means move forward that many keywords."
253257
254(defun check-cves-mode-prompt-with-suggested-names (prompt &optional history names)258(defun check-cves-mode-prompt-with-suggested-names (prompt &optional history names)
255 "Get the suggested NAMES from the ignore line for this CVE via PROMPT with HISTORY."259 "Get the suggested NAMES from the ignore line for this CVE via PROMPT with HISTORY."
260 (if (and names (symbolp names) (not (functionp names)))
261 (setq names (eval names)))
256 (list (completing-read prompt (or names (check-cves-mode-suggested-names))262 (list (completing-read prompt (or names (check-cves-mode-suggested-names))
257 nil nil nil history)))263 nil nil nil history)))
258264
@@ -330,11 +336,13 @@ identifier (XXXX-YYYY) via `format'.")
330 `((:name "apt show"336 `((:name "apt show"
331 :command "apt show %s"337 :command "apt show %s"
332 :downcase t338 :downcase t
333 :mode compilation-mode)339 :mode compilation-mode
340 :candidates check-cves-mode-binary-packages)
334 (:name "apt showsrc"341 (:name "apt showsrc"
335 :command "apt showsrc %s"342 :command "apt showsrc %s"
336 :downcase t343 :downcase t
337 :mode compilation-mode)344 :mode compilation-mode
345 :candidates check-cves-mode-source-packages)
338 (:name "apt search (host)"346 (:name "apt search (host)"
339 :command "apt search %s"347 :command "apt search %s"
340 :mode compilation-mode)348 :mode compilation-mode)
@@ -351,7 +359,8 @@ identifier (XXXX-YYYY) via `format'.")
351 (:name "rmadison"359 (:name "rmadison"
352 :command "rmadison %s"360 :command "rmadison %s"
353 :downcase t361 :downcase t
354 :mode compilation-mode)362 :mode compilation-mode
363 :candidates check-cves-mode-source-packages)
355 (:name "umt grep"364 (:name "umt grep"
356 :command "umt grep %s"365 :command "umt grep %s"
357 :downcase t366 :downcase t
@@ -359,7 +368,8 @@ identifier (XXXX-YYYY) via `format'.")
359 (:name "umt search"368 (:name "umt search"
360 :command "umt search %s"369 :command "umt search %s"
361 :downcase t370 :downcase t
362 :mode compilation-mode)371 :mode compilation-mode
372 :candidates check-cves-mode-source-packages)
363 (:name "command-not-found"373 (:name "command-not-found"
364 :command "/usr/lib/command-not-found %s"374 :command "/usr/lib/command-not-found %s"
365 :downcase t375 :downcase t
@@ -410,11 +420,16 @@ identifier (XXXX-YYYY) via `format'.")
410(defun check-cves-mode-search (tool-name keywords)420(defun check-cves-mode-search (tool-name keywords)
411 "Search the current CVEs KEYWORDS with TOOL-NAME (apt / umt etc)."421 "Search the current CVEs KEYWORDS with TOOL-NAME (apt / umt etc)."
412 (interactive422 (interactive
413 (list423 (let* ((name (completing-read "Tool: "
414 (completing-read "Tool: "424 (mapcar #'(lambda (e) (plist-get e :name))
415 (mapcar #'(lambda (e) (plist-get e :name))425 check-cves-mode-search-tools)
416 check-cves-mode-search-tools))426 nil t))
417 (check-cves-mode-prompt-with-suggested-names "Keywords: ")))427 (tool (check-cves-mode-find-search-tool name)))
428 (list
429 name
430 (check-cves-mode-prompt-with-suggested-names "Keywords: "
431 nil
432 (plist-get tool :candidates)))))
418 (let ((tool (check-cves-mode-find-search-tool tool-name))433 (let ((tool (check-cves-mode-find-search-tool tool-name))
419 (words (mapconcat #'identity keywords " ")))434 (words (mapconcat #'identity keywords " ")))
420 (unless tool435 (unless tool
diff --git a/scripts/cve-mode.el b/scripts/cve-mode.el
index 4f67f64..cc1b1f8 100644
--- a/scripts/cve-mode.el
+++ b/scripts/cve-mode.el
@@ -295,7 +295,7 @@ When set to first, following lines will be indented by an extra space."
295295
296(defvar cve-mode--source-packages296(defvar cve-mode--source-packages
297 (split-string297 (split-string
298 (shell-command-to-string "source ~/.ubuntu-cve-tracker.conf; cat $packages_mirror/sources")))298 (shell-command-to-string "umt grep '.*'")))
299299
300(defvar cve-mode--packages-releases nil)300(defvar cve-mode--packages-releases nil)
301301
diff --git a/scripts/publish-cves-to-website-api.py b/scripts/publish-cves-to-website-api.py
index f5e957b..1adc0bd 100755
--- a/scripts/publish-cves-to-website-api.py
+++ b/scripts/publish-cves-to-website-api.py
@@ -203,6 +203,13 @@ def main():
203 default=25,203 default=25,
204 )204 )
205 parser.add_argument(205 parser.add_argument(
206 "--endpoint",
207 action="store",
208 type=str,
209 default="https://ubuntu.com/security/",
210 help="API endpoint url. default is https://ubuntu.com/security/",
211 )
212 parser.add_argument(
206 "file_path",213 "file_path",
207 action="store",214 action="store",
208 type=str,215 type=str,
@@ -211,8 +218,6 @@ def main():
211 )218 )
212 args = parser.parse_args()219 args = parser.parse_args()
213220
214 url = "https://ubuntu.com/security/"
215
216 ## if args:221 ## if args:
217 ## headers = {"Content-type": "application/json"}222 ## headers = {"Content-type": "application/json"}
218 cves = []223 cves = []
@@ -283,7 +288,7 @@ def main():
283 for chunk in [288 for chunk in [
284 cves[i : i + chunksize] for i in range(0, len(cves), chunksize) # noqa: E203289 cves[i : i + chunksize] for i in range(0, len(cves), chunksize) # noqa: E203
285 ]:290 ]:
286 push_chunks(args, url, chunk)291 push_chunks(args, args.endpoint, chunk)
287292
288 for cve_id in cache_not_for_us_cve_ids:293 for cve_id in cache_not_for_us_cve_ids:
289 add_cve_to_ignore_cache(cve_id)294 add_cve_to_ignore_cache(cve_id)

Subscribers

People subscribed via source and target branches