|
@@ -1,26 +1,24 @@
|
|
|
-# This is specific to Ubuntu
|
|
|
-CVE_CHECK_IGNORE += "CVE-2018-6559"
|
|
|
+CVE_STATUS[CVE-2018-6559] = "not-applicable-platform: Issue only affects Ubuntu"
|
|
|
|
|
|
# https://www.linuxkernelcves.com/cves/CVE-2019-3016
|
|
|
# Fixed with 5.6
|
|
|
-CVE_CHECK_IGNORE += "CVE-2019-3016"
|
|
|
+CVE_STATUS[CVE-2019-3016] = "fixed-version: Fixed in version v5.6"
|
|
|
|
|
|
# https://www.linuxkernelcves.com/cves/CVE-2019-3819
|
|
|
# Fixed with 5.1
|
|
|
-CVE_CHECK_IGNORE += "CVE-2019-3819"
|
|
|
+CVE_STATUS[CVE-2019-3819] = "fixed-version: Fixed in version v5.1"
|
|
|
|
|
|
# https://www.linuxkernelcves.com/cves/CVE-2019-3887
|
|
|
# Fixed with 5.2
|
|
|
-CVE_CHECK_IGNORE += "CVE-2019-3887"
|
|
|
+CVE_STATUS[CVE-2019-3887] = "fixed-version: Fixed in version v5.2"
|
|
|
|
|
|
-# This is specific to aufs, which is not in linux-yocto
|
|
|
-CVE_CHECK_IGNORE += "CVE-2020-11935"
|
|
|
+CVE_STATUS[CVE-2020-11935] = "not-applicable-config: Issue only affects aufs, which is not in linux-yocto"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2020-27784
|
|
|
# Introduced in version v4.1 b26394bd567e5ebe57ec4dee7fe6cd14023c96e9
|
|
|
# Patched in kernel since v5.10 e8d5f92b8d30bb4ade76494490c3c065e12411b1
|
|
|
# Backported in version v5.4.73 e9e791f5c39ab30e374a3b1a9c25ca7ff24988f3
|
|
|
-CVE_CHECK_IGNORE += "CVE-2020-27784"
|
|
|
+CVE_STATUS[CVE-2020-27784] = "cpe-stable-backport: Backported in version v5.4.73"
|
|
|
|
|
|
|
|
|
# 2021
|
|
@@ -28,19 +26,19 @@ CVE_CHECK_IGNORE += "CVE-2020-27784"
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2021-3669
|
|
|
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
|
|
# Patched in kernel since v5.15 20401d1058f3f841f35a594ac2fc1293710e55b9
|
|
|
-CVE_CHECK_IGNORE += "CVE-2021-3669"
|
|
|
+CVE_STATUS[CVE-2021-3669] = "fixed-version: Fixed in version v5.15"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2021-3759
|
|
|
# Introduced in version v4.5 a9bb7e620efdfd29b6d1c238041173e411670996
|
|
|
# Patched in kernel since v5.15 18319498fdd4cdf8c1c2c48cd432863b1f915d6f
|
|
|
# Backported in version v5.4.224 bad83d55134e647a739ebef2082541963f2cbc92
|
|
|
# Backported in version v5.10.154 836686e1a01d7e2fda6a5a18252243ff30a6e196
|
|
|
-CVE_CHECK_IGNORE += "CVE-2021-3759"
|
|
|
+CVE_STATUS[CVE-2021-3759] = "cpe-stable-backport: Backported in versions v5.4.224 and v6.1.11"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2021-4218
|
|
|
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
|
|
# Patched in kernel since v5.8 32927393dc1ccd60fb2bdc05b9e8e88753761469
|
|
|
-CVE_CHECK_IGNORE += "CVE-2021-4218"
|
|
|
+CVE_STATUS[CVE-2021-4218] = "fixed-version: Fixed in version v5.8"
|
|
|
|
|
|
|
|
|
# 2022
|
|
@@ -48,7 +46,7 @@ CVE_CHECK_IGNORE += "CVE-2021-4218"
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-0480
|
|
|
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
|
|
# Patched in kernel since v5.15 0f12156dff2862ac54235fc72703f18770769042
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-0480"
|
|
|
+CVE_STATUS[CVE-2022-0480] = "fixed-version: Fixed in version v5.15"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-1184
|
|
|
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
|
@@ -56,7 +54,7 @@ CVE_CHECK_IGNORE += "CVE-2022-0480"
|
|
|
# Backported in version v5.4.198 17034d45ec443fb0e3c0e7297f9cd10f70446064
|
|
|
# Backported in version v5.10.121 da2f05919238c7bdc6e28c79539f55c8355408bb
|
|
|
# Backported in version v5.15.46 ca17db384762be0ec38373a12460081d22a8b42d
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-1184"
|
|
|
+CVE_STATUS[CVE-2022-1184] = "cpe-stable-backport: Backported in versions v5.4.198, v5.10.121 and v5.15.46"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-1462
|
|
|
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
|
@@ -64,7 +62,7 @@ CVE_CHECK_IGNORE += "CVE-2022-1184"
|
|
|
# Backported in version v5.4.208 f7785092cb7f022f59ebdaa181651f7c877df132
|
|
|
# Backported in version v5.10.134 08afa87f58d83dfe040572ed591b47e8cb9e225c
|
|
|
# Backported in version v5.15.58 b2d1e4cd558cffec6bfe318f5d74e6cffc374d29
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-1462"
|
|
|
+CVE_STATUS[CVE-2022-1462] = "cpe-stable-backport: Backported in versions v5.4.208, v5.10.134 and v5.15.58"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-2196
|
|
|
# Introduced in version v5.8 5c911beff20aa8639e7a1f28988736c13e03ed54
|
|
@@ -74,19 +72,19 @@ CVE_CHECK_IGNORE += "CVE-2022-1462"
|
|
|
# Backported in version v5.10.170 1b0cafaae8884726c597caded50af185ffc13349
|
|
|
# Backported in version v5.15.96 6b539a7dbb49250f92515c2ba60aea239efc9e35
|
|
|
# Backported in version v6.1.14 63fada296062e91ad9f871970d4e7f19e21a6a15
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-2196"
|
|
|
+CVE_STATUS[CVE-2022-2196] = "cpe-stable-backport: Backported in versions v5.4.1233, v5.10.170, v5.15.46 and v6.1.14"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-2308
|
|
|
# Introduced in version v5.15 c8a6153b6c59d95c0e091f053f6f180952ade91e
|
|
|
# Patched in kernel since v6.0 46f8a29272e51b6df7393d58fc5cb8967397ef2b
|
|
|
# Backported in version v5.15.72 dc248ddf41eab4566e95b1ee2433c8a5134ad94a
|
|
|
# Backported in version v5.19.14 38d854c4a11c3bbf6a96ea46f14b282670c784ac
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-2308"
|
|
|
+CVE_STATUS[CVE-2022-2308] = "cpe-stable-backport: Backported in versions v5.15.72 and v5.19.14"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-2327
|
|
|
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
|
|
# Patched in kernel since v5.10.125 df3f3bb5059d20ef094d6b2f0256c4bf4127a859
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-2327"
|
|
|
+CVE_STATUS[CVE-2022-2327] = "fixed-version: Fixed in version v5.10.125"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-2663
|
|
|
# Introduced in version v2.6.20 869f37d8e48f3911eb70f38a994feaa8f8380008
|
|
@@ -95,19 +93,19 @@ CVE_CHECK_IGNORE += "CVE-2022-2327"
|
|
|
# Backported in version v5.10.143 e12ce30fe593dd438c5b392290ad7316befc11ca
|
|
|
# Backported in version v5.15.68 451c9ce1e2fc9b9e40303bef8e5a0dca1a923cc4
|
|
|
# Backported in version v5.19.9 6cf0609154b2ce8d3ae160e7506ab316400a8d3d
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-2663"
|
|
|
+CVE_STATUS[CVE-2022-2663] = "cpe-stable-backport: Backported in versions v5.4.213, v5.10.143, v5.15.68 and v5.19.9"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-2785
|
|
|
# Introduced in version v5.18 b1d18a7574d0df5eb4117c14742baf8bc2b9bb74
|
|
|
# Patched in kernel since v6.0 86f44fcec22ce2979507742bc53db8400e454f46
|
|
|
# Backported in version v5.19.4 b429d0b9a7a0f3dddb1f782b72629e6353f292fd
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-2785"
|
|
|
+CVE_STATUS[CVE-2022-2785] = "cpe-stable-backport: Backported in version v5.19.4"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3176
|
|
|
# Introduced in version v5.1 221c5eb2338232f7340386de1c43decc32682e58
|
|
|
# Patched in kernel since v5.17 791f3465c4afde02d7f16cf7424ca87070b69396
|
|
|
# Backported in version v5.15.65 e9d7ca0c4640cbebe6840ee3bac66a25a9bacaf5
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3176"
|
|
|
+CVE_STATUS[CVE-2022-3176] = "cpe-stable-backport: Backported in version v5.15.65"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3424
|
|
|
# Introduced in version v2.6.33 55484c45dbeca2eec7642932ec3f60f8a2d4bdbf
|
|
@@ -116,7 +114,7 @@ CVE_CHECK_IGNORE += "CVE-2022-3176"
|
|
|
# Backported in version v5.10.163 0f67ed565f20ea2fdd98e3b0b0169d9e580bb83c
|
|
|
# Backported in version v5.15.86 d5c8f9003a289ee2a9b564d109e021fc4d05d106
|
|
|
# Backported in version v6.1.2 4e947fc71bec7c7da791f8562d5da233b235ba5e
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3424"
|
|
|
+CVE_STATUS[CVE-2022-3424] = "cpe-stable-backport: Backported in versions v5.4.229, v5.10.163, v5.15.86 and v 6.1.2"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3435
|
|
|
# Introduced in version v5.18 6bf92d70e690b7ff12b24f4bfff5e5434d019b82
|
|
@@ -127,18 +125,18 @@ CVE_CHECK_IGNORE += "CVE-2022-3424"
|
|
|
# Backported in version v5.4.226 cc3cd130ecfb8b0ae52e235e487bae3f16a24a32
|
|
|
# Backported in version v5.10.158 0b5394229ebae09afc07aabccb5ffd705ffd250e
|
|
|
# Backported in version v5.15.82 25174d91e4a32a24204060d283bd5fa6d0ddf133
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3435"
|
|
|
+CVE_STATUS[CVE-2022-3435] = "cpe-stable-backport: Backported in versions v5.4.226, v5.10.158 and v5.15.82"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3523
|
|
|
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
|
|
# Patched in kernel since v6.1 16ce101db85db694a91380aa4c89b25530871d33
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3523"
|
|
|
+CVE_STATUS[CVE-2022-3523] = "fixed-version: Fixed in version v6.1"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3526
|
|
|
# Introduced in version v5.13 427f0c8c194b22edcafef1b0a42995ddc5c2227d
|
|
|
# Patched in kernel since v5.18 e16b859872b87650bb55b12cca5a5fcdc49c1442
|
|
|
# Backported in version v5.15.35 8f79ce226ad2e9b2ec598de2b9560863b7549d1b
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3526"
|
|
|
+CVE_STATUS[CVE-2022-3526] = "cpe-stable-backport: Backported in version v5.15.35"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3534
|
|
|
# Introduced in version v5.10 919d2b1dbb074d438027135ba644411931179a59
|
|
@@ -146,30 +144,30 @@ CVE_CHECK_IGNORE += "CVE-2022-3526"
|
|
|
# Backported in version v5.10.163 c61650b869e0b6fb0c0a28ed42d928eea969afc8
|
|
|
# Backported in version v5.15.86 a733bf10198eb5bb927890940de8ab457491ed3b
|
|
|
# Backported in version v6.1.2 fbe08093fb2334549859829ef81d42570812597d
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3534"
|
|
|
+CVE_STATUS[CVE-2022-3534] = "cpe-stable-backport: Backported in versions v5.10.163, v5.15.86 and v6.1.2"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3564
|
|
|
# Introduced in version v3.6 4b51dae96731c9d82f5634e75ac7ffd3b9c1b060
|
|
|
# Patched in kernel since v6.1 3aff8aaca4e36dc8b17eaa011684881a80238966
|
|
|
# Backported in version v5.10.154 cb1c012099ef5904cd468bdb8d6fcdfdd9bcb569
|
|
|
# Backported in version v5.15.78 8278a87bb1eeea94350d675ef961ee5a03341fde
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3564"
|
|
|
+CVE_STATUS[CVE-2022-3564] = "cpe-stable-backport: Backported in versions v5.10.154 and v5.15.78"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3566
|
|
|
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
|
|
# Patched in kernel since v6.1 f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3566"
|
|
|
+CVE_STATUS[CVE-2022-3566] = "fixed-version: Fixed in version v6.1"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3567
|
|
|
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
|
|
# Patched in kernel since v6.1 364f997b5cfe1db0d63a390fe7c801fa2b3115f6
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3567"
|
|
|
+CVE_STATUS[CVE-2022-3567] = "fixed-version: Fixed in version v6.1"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3619
|
|
|
# Introduced in version v5.12 4d7ea8ee90e42fc75995f6fb24032d3233314528
|
|
|
# Patched in kernel since v6.1 7c9524d929648935bac2bbb4c20437df8f9c3f42
|
|
|
# Backported in version v5.15.78 aa16cac06b752e5f609c106735bd7838f444784c
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3619"
|
|
|
+CVE_STATUS[CVE-2022-3619] = "cpe-stable-backport: Backported in version v5.15.78"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3621
|
|
|
# Introduced in version v2.60.30 05fe58fdc10df9ebea04c0eaed57adc47af5c184
|
|
@@ -178,7 +176,7 @@ CVE_CHECK_IGNORE += "CVE-2022-3619"
|
|
|
# Backported in version v5.10.148 3f840480e31495ce674db4a69912882b5ac083f2
|
|
|
# Backported in version v5.15.74 1e512c65b4adcdbdf7aead052f2162b079cc7f55
|
|
|
# Backported in version v5.19.16 caf2c6b580433b3d3e413a3d54b8414a94725dcd
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3621"
|
|
|
+CVE_STATUS[CVE-2022-3621] = "cpe-stable-backport: Backported in versions v5.4.218, v5.10.148, v5.15.74 and v5.19.16"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3623
|
|
|
# Introduced in version v5.1 5480280d3f2d11d47f9be59d49b20a8d7d1b33e8
|
|
@@ -187,12 +185,12 @@ CVE_CHECK_IGNORE += "CVE-2022-3621"
|
|
|
# Backported in version v5.10.159 fccee93eb20d72f5390432ecea7f8c16af88c850
|
|
|
# Backported in version v5.15.78 3a44ae4afaa5318baed3c6e2959f24454e0ae4ff
|
|
|
# Backported in version v5.19.17 86a913d55c89dd13ba070a87f61a493563e94b54
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3623"
|
|
|
+CVE_STATUS[CVE-2022-3623] = "cpe-stable-backport: Backported in versions v5.4.228, v5.10.159, v5.15.78 and v 5.19.17"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3624
|
|
|
# Introduced in version v6.0 d5410ac7b0baeca91cf73ff5241d35998ecc8c9e
|
|
|
# Patched in kernel since v6.0 4f5d33f4f798b1c6d92b613f0087f639d9836971
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3624"
|
|
|
+CVE_STATUS[CVE-2022-3624] = "fixed-version: Fixed in version v6.0"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3625
|
|
|
# Introduced in version v4.19 45f05def5c44c806f094709f1c9b03dcecdd54f0
|
|
@@ -201,7 +199,7 @@ CVE_CHECK_IGNORE += "CVE-2022-3624"
|
|
|
# Backported in version v5.10.138 0e28678a770df7989108327cfe86f835d8760c33
|
|
|
# Backported in version v5.15.63 c4d09fd1e18bac11c2f7cf736048112568687301
|
|
|
# Backported in version v5.19.4 26bef5616255066268c0e40e1da10cc9b78b82e9
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3625"
|
|
|
+CVE_STATUS[CVE-2022-3625] = "cpe-stable-backport: Backported in versions v5.4.211, v5.10.138, v5.15.63 and v5.19.4"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3629
|
|
|
# Introduced in version v3.9 d021c344051af91f42c5ba9fdedc176740cbd238
|
|
@@ -210,13 +208,13 @@ CVE_CHECK_IGNORE += "CVE-2022-3625"
|
|
|
# Backported in version v5.10.138 38ddccbda5e8b762c8ee06670bb1f64f1be5ee50
|
|
|
# Backported in version v5.15.63 e4c0428f8a6fc8c218d7fd72bddd163f05b29795
|
|
|
# Backported in version v5.19.4 8ff5db3c1b3d6797eda5cd326dcd31b9cd1c5f72
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3629"
|
|
|
+CVE_STATUS[CVE-2022-3629] = "cpe-stable-backport: Backported in versions v5.4.211, v5.10.138, v5.15.63 and v5.19.4"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3630
|
|
|
# Introduced in version v5.19 85e4ea1049c70fb99de5c6057e835d151fb647da
|
|
|
# Patched in kernel since v6.0 fb24771faf72a2fd62b3b6287af3c610c3ec9cf1
|
|
|
# Backported in version v5.19.4 7a369dc87b66acc85d0cffcf39984344a203e20b
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3630"
|
|
|
+CVE_STATUS[CVE-2022-3630] = "cpe-stable-backport: Backported in version v5.19.4"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3633
|
|
|
# Introduced in version v5.4 9d71dd0c70099914fcd063135da3c580865e924c
|
|
@@ -225,7 +223,7 @@ CVE_CHECK_IGNORE += "CVE-2022-3630"
|
|
|
# Backported in version v5.10.138 a220ff343396bae8d3b6abee72ab51f1f34b3027
|
|
|
# Backported in version v5.15.63 98dc8fb08299ab49e0b9c08daedadd2f4de1a2f2
|
|
|
# Backported in version v5.19.4 a0278dbeaaf7ca60346c62a9add65ae7d62564de
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3633"
|
|
|
+CVE_STATUS[CVE-2022-3633] = "cpe-stable-backport: Backported in versions v5.4.211, v5.10.138, v5.15.63 and v5.19.4"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3635
|
|
|
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
|
@@ -234,12 +232,12 @@ CVE_CHECK_IGNORE += "CVE-2022-3633"
|
|
|
# Backported in version v5.10.138 a0ae122e9aeccbff75014c4d36d11a9d32e7fb5e
|
|
|
# Backported in version v5.15.63 a5d7ce086fe942c5ab422fd2c034968a152be4c4
|
|
|
# Backported in version v5.19.4 af412b252550f9ac36d9add7b013c2a2c3463835
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3635"
|
|
|
+CVE_STATUS[CVE-2022-3635] = "cpe-stable-backport: Backported in versions v5.4.211, v5.10.138, v5.15.63 and v5.19.4"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3636
|
|
|
# Introduced in version v5.19 33fc42de33278b2b3ec6f3390512987bc29a62b7
|
|
|
# Patched in kernel since v5.19 17a5f6a78dc7b8db385de346092d7d9f9dc24df6
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3636"
|
|
|
+CVE_STATUS[CVE-2022-3636] = "cpe-stable-backport: Backported in version v5.19"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3640
|
|
|
# Introduced in version v5.19 d0be8347c623e0ac4202a1d4e0373882821f56b0
|
|
@@ -250,7 +248,7 @@ CVE_CHECK_IGNORE += "CVE-2022-3636"
|
|
|
# Backported in version v5.4.224 c1f594dddd9ffd747c39f49cc5b67a9b7677d2ab
|
|
|
# Backported in version v5.10.154 d9ec6e2fbd4a565b2345d4852f586b7ae3ab41fd
|
|
|
# Backported in version v5.15.78 a3a7b2ac64de232edb67279e804932cb42f0b52a
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3640"
|
|
|
+CVE_STATUS[CVE-2022-3640] = "cpe-stable-backport: Backported in versions v5.4.224, v5.10.154 and v5.15.78"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3646
|
|
|
# Introduced in version v2.6.30 9ff05123e3bfbb1d2b68ba1d9bf1f7d1dffc1453
|
|
@@ -259,7 +257,7 @@ CVE_CHECK_IGNORE += "CVE-2022-3640"
|
|
|
# Backported in version v5.10.148 aad4c997857f1d4b6c1e296c07e4729d3f8058ee
|
|
|
# Backported in version v5.15.74 44b1ee304bac03f1b879be5afe920e3a844e40fc
|
|
|
# Backported in version v5.19.16 4755fcd844240857b525f6e8d8b65ee140fe9570
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3646"
|
|
|
+CVE_STATUS[CVE-2022-3646] = "cpe-stable-backport: Backported in versions v5.4.218, v5.10.148, v5.15.74 and v5.19.16"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-3649
|
|
|
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
|
@@ -268,7 +266,7 @@ CVE_CHECK_IGNORE += "CVE-2022-3646"
|
|
|
# Backported in version v5.10.148 21ee3cffed8fbabb669435facfd576ba18ac8652
|
|
|
# Backported in version v5.15.74 cb602c2b654e26763226d8bd27a702f79cff4006
|
|
|
# Backported in version v5.19.16 394b2571e9a74ddaed55aa9c4d0f5772f81c21e4
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-3649"
|
|
|
+CVE_STATUS[CVE-2022-3649] = "cpe-stable-backport: Backported in versions v5.4.220, v5.10.148, v5.15.74 and v5.19.16"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-4382
|
|
|
# Introduced in version v5.3 e5d82a7360d124ae1a38c2a5eac92ba49b125191
|
|
@@ -277,7 +275,7 @@ CVE_CHECK_IGNORE += "CVE-2022-3649"
|
|
|
# Backported in version v5.10.165 856e4b5e53f21edbd15d275dde62228dd94fb2b4
|
|
|
# Backported in version v5.15.90 a2e075f40122d8daf587db126c562a67abd69cf9
|
|
|
# Backported in version v6.1.8 616fd34d017000ecf9097368b13d8a266f4920b3
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-4382"
|
|
|
+CVE_STATUS[CVE-2022-4382] = "cpe-stable-backport: Backported in versions v5.4.230, v5.10.165, v5.15.90 and v6.1.8"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-26365
|
|
|
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
|
@@ -285,7 +283,7 @@ CVE_CHECK_IGNORE += "CVE-2022-4382"
|
|
|
# Backported in version v5.4.204 42112e8f94617d83943f8f3b8de2b66041905506
|
|
|
# Backported in version v5.10.129 cfea428030be836d79a7690968232bb7fa4410f1
|
|
|
# Backported in version v5.15.53 7ed65a4ad8fa9f40bc3979b32c54243d6a684ec9
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-26365"
|
|
|
+CVE_STATUS[CVE-2022-26365] = "cpe-stable-backport: Backported in versions v5.4.204, v5.10.129 and v5.15.53"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-33740
|
|
|
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
|
@@ -293,7 +291,7 @@ CVE_CHECK_IGNORE += "CVE-2022-26365"
|
|
|
# Backported in version v5.4.204 04945b5beb73019145ac17a2565526afa7293c14
|
|
|
# Backported in version v5.10.129 728d68bfe68d92eae1407b8a9edc7817d6227404
|
|
|
# Backported in version v5.15.53 5dd0993c36832d33820238fc8dc741ba801b7961
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-33740"
|
|
|
+CVE_STATUS[CVE-2022-33740] = "cpe-stable-backport: Backported in versions v5.4.204, v5.10.129 and v5.15.53"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-33741
|
|
|
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
|
@@ -301,7 +299,7 @@ CVE_CHECK_IGNORE += "CVE-2022-33740"
|
|
|
# Backported in version v5.4.204 ede57be88a5fff42cd00e6bcd071503194d398dd
|
|
|
# Backported in version v5.10.129 4923217af5742a796821272ee03f8d6de15c0cca
|
|
|
# Backported in version v5.15.53 ed3cfc690675d852c3416aedb271e0e7d179bf49
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-33741"
|
|
|
+CVE_STATUS[CVE-2022-33741] = "cpe-stable-backport: Backported in versions v5.4.204, v5.10.129 and v5.15.53"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-33742
|
|
|
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
|
@@ -309,15 +307,15 @@ CVE_CHECK_IGNORE += "CVE-2022-33741"
|
|
|
# Backported in version v5.4.204 60ac50daad36ef3fe9d70d89cfe3b95d381db997
|
|
|
# Backported in version v5.10.129 cbbd2d2531539212ff090aecbea9877c996e6ce6
|
|
|
# Backported in version v5.15.53 6d0a9127279a4533815202e30ad1b3a39f560ba3
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-33742"
|
|
|
+CVE_STATUS[CVE-2022-33742] = "cpe-stable-backport: Backported in versions v5.4.204, v5.10.129 and v5.15.53"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-42895
|
|
|
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
|
|
# Patched in kernel since v6.1 b1a2cd50c0357f243b7435a732b4e62ba3157a2e
|
|
|
-# Backported in version v5.15.78 3e4697ffdfbb38a2755012c4e571546c89ab6422
|
|
|
-# Backported in version v5.10.154 26ca2ac091b49281d73df86111d16e5a76e43bd7
|
|
|
# Backported in version v5.4.224 6949400ec9feca7f88c0f6ca5cb5fdbcef419c89
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-42895"
|
|
|
+# Backported in version v5.10.154 26ca2ac091b49281d73df86111d16e5a76e43bd7
|
|
|
+# Backported in version v5.15.78 3e4697ffdfbb38a2755012c4e571546c89ab6422
|
|
|
+CVE_STATUS[CVE-2022-42895] = "cpe-stable-backport: Backported in versions v5.4.224, v5.10.154 and v5.15.78"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-42896
|
|
|
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
|
@@ -325,7 +323,7 @@ CVE_CHECK_IGNORE += "CVE-2022-42895"
|
|
|
# Backported in version v5.4.226 0d87bb6070361e5d1d9cb391ba7ee73413bc109b
|
|
|
# Backported in version v5.10.154 6b6f94fb9a74dd2891f11de4e638c6202bc89476
|
|
|
# Backported in version v5.15.78 81035e1201e26d57d9733ac59140a3e29befbc5a
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-42896"
|
|
|
+CVE_STATUS[CVE-2022-42896] = "cpe-stable-backport: Backported in versions v5.4.226, v5.10.154 and v5.15.78"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-38457
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2022-40133
|
|
@@ -337,10 +335,11 @@ CVE_CHECK_IGNORE += "CVE-2022-42896"
|
|
|
# * https://www.linuxkernelcves.com/cves/CVE-2022-38457
|
|
|
# * https://www.linuxkernelcves.com/cves/CVE-2022-40133
|
|
|
# * https://lore.kernel.org/all/CAODzB9q3OBD0k6W2bcWrSZo2jC3EvV0PrLyWmO07rxR4nQgkJA@mail.gmail.com/T/
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-38457 CVE-2022-40133"
|
|
|
+CVE_STATUS[CVE-2022-38457] = "cpe-stable-backport: Backported in version v6.1.7"
|
|
|
+CVE_STATUS[CVE-2022-40133] = "cpe-stable-backport: Backported in version v6.1.7"
|
|
|
|
|
|
# Backported to 6.1.33
|
|
|
-CVE_CHECK_IGNORE += "CVE-2022-48425"
|
|
|
+CVE_STATUS[CVE-2022-48425] = "cpe-stable-backport: Backported in version v6.1.33"
|
|
|
|
|
|
# 2023
|
|
|
|
|
@@ -349,14 +348,14 @@ CVE_CHECK_IGNORE += "CVE-2022-48425"
|
|
|
# Backported in version v5.10.164 550efeff989b041f3746118c0ddd863c39ddc1aa
|
|
|
# Backported in version v5.15.89 a8acfe2c6fb99f9375a9325807a179cd8c32e6e3
|
|
|
# Backported in version v6.1.7 76ef74d4a379faa451003621a84e3498044e7aa3
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-0179"
|
|
|
+CVE_STATUS[CVE-2023-0179] = "cpe-stable-backport: Backported in versions v5.10.164, v5.15.89 and v6.1.7"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2023-0266
|
|
|
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
|
|
# Patched in kernel since v6.2 56b88b50565cd8b946a2d00b0c83927b7ebb055e
|
|
|
# Backported in version v5.15.88 26350c21bc5e97a805af878e092eb8125843fe2c
|
|
|
# Backported in version v6.1.6 d6ad4bd1d896ae1daffd7628cd50f124280fb8b1
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-0266"
|
|
|
+CVE_STATUS[CVE-2023-0266] = "cpe-stable-backport: Backported in versions v5.15.88 and v6.1.6"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2023-0394
|
|
|
# Introduced in version 2.6.12 357b40a18b04c699da1d45608436e9b76b50e251
|
|
@@ -365,14 +364,14 @@ CVE_CHECK_IGNORE += "CVE-2023-0266"
|
|
|
# Backported in version v5.10.164 6c9e2c11c33c35563d34d12b343d43b5c12200b5
|
|
|
# Backported in version v5.15.89 456e3794e08a0b59b259da666e31d0884b376bcf
|
|
|
# Backported in version v6.1.7 0afa5f0736584411771299074bbeca8c1f9706d4
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-0394"
|
|
|
+CVE_STATUS[CVE-2023-0394] = "cpe-stable-backport: Backported in versions v5.4.229, v5.10.164, v5.15.89 and v6.1.7"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2023-0386
|
|
|
# Introduced in 5.11 459c7c565ac36ba09ffbf24231147f408fde4203
|
|
|
# Patched in kernel v6.2 4f11ada10d0ad3fd53e2bd67806351de63a4f9c3
|
|
|
-# Backported in version 6.1.9 42fea1c35254c49cce07c600d026cbc00c6d3c81
|
|
|
# Backported in version 5.15.91 e91308e63710574c4b6a0cadda3e042a3699666e
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-0386"
|
|
|
+# Backported in version 6.1.9 42fea1c35254c49cce07c600d026cbc00c6d3c81
|
|
|
+CVE_STATUS[CVE-2023-0386] = "cpe-stable-backport: Backported in versions v5.15.91 and v6.1.9"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2023-0461
|
|
|
# Introduced in version v4.13 734942cc4ea6478eed125af258da1bdbb4afe578
|
|
@@ -381,7 +380,7 @@ CVE_CHECK_IGNORE += "CVE-2023-0386"
|
|
|
# Backported in version v5.10.163 f8ed0a93b5d576bbaf01639ad816473bdfd1dcb0
|
|
|
# Backported in version v5.15.88 dadd0dcaa67d27f550131de95c8e182643d2c9d6
|
|
|
# Backported in version v6.1.5 7d242f4a0c8319821548c7176c09a6e0e71f223c
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-0461"
|
|
|
+CVE_STATUS[CVE-2023-0461] = "cpe-stable-backport: Backported in versions v5.4.229, v5.10.163, v5.15.88 and v6.1.5"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2023-1073
|
|
|
# Introduced in v3.16 1b15d2e5b8077670b1e6a33250a0d9577efff4a5
|
|
@@ -389,20 +388,20 @@ CVE_CHECK_IGNORE += "CVE-2023-0461"
|
|
|
# Backported in version 5.10.166 5dc3469a1170dd1344d262a332b26994214eeb58
|
|
|
# Backported in version 5.15.91 2b49568254365c9c247beb0eabbaa15d0e279d64
|
|
|
# Backported in version 6.1.9 cdcdc0531a51659527fea4b4d064af343452062d
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1073"
|
|
|
+CVE_STATUS[CVE-2023-1073] = "cpe-stable-backport: Backported in versions v5.10.166, v5.15.91 and v6.1.9"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2023-1074
|
|
|
# Patched in kernel v6.2 458e279f861d3f61796894cd158b780765a1569f
|
|
|
# Backported in version 5.15.91 3391bd42351be0beb14f438c7556912b9f96cb32
|
|
|
# Backported in version 6.1.9 9f08bb650078dca24a13fea1c375358ed6292df3
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1074"
|
|
|
+CVE_STATUS[CVE-2023-1074] = "cpe-stable-backport: Backported in versions v5.15.91 andv6.1.9"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2023-1075
|
|
|
# Introduced in v4.20 a42055e8d2c30d4decfc13ce943d09c7b9dad221
|
|
|
# Patched in kernel v6.2 ffe2a22562444720b05bdfeb999c03e810d84cbb
|
|
|
# Backported in version 6.1.11 37c0cdf7e4919e5f76381ac60817b67bcbdacb50
|
|
|
# 5.15 still has issue, include/net/tls.h:is_tx_ready() would need patch
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1075"
|
|
|
+CVE_STATUS[CVE-2023-1075] = "cpe-stable-backport: Backported in version v6.1.11"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2023-1076
|
|
|
# Patched in kernel v6.3 a096ccca6e503a5c575717ff8a36ace27510ab0a
|
|
@@ -411,19 +410,19 @@ CVE_CHECK_IGNORE += "CVE-2023-1075"
|
|
|
# Backported in version v5.15.99 67f9f02928a34aad0a2c11dab5eea269f5ecf427
|
|
|
# Backported in version v6.1.16 b4ada752eaf1341f47bfa3d8ada377eca75a8d44
|
|
|
# Backported in version v6.2.3 4aa4b4b3b3e9551c4de2bf2987247c28805fb8f6
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1076"
|
|
|
+CVE_STATUS[CVE-2023-1076] = "cpe-stable-backport: Backported in versions v5.4.235, v5.10.173, v5.15.99, v6.1.16 and v6.2.3"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2023-1077
|
|
|
# Patched in kernel 6.3rc1 7c4a5b89a0b5a57a64b601775b296abf77a9fe97
|
|
|
# Backported in version 5.15.99 2c36c390a74981d03f04f01fe7ee9c3ac3ea11f7
|
|
|
# Backported in version 6.1.16 6b4fcc4e8a3016e85766c161daf0732fca16c3a3
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1077"
|
|
|
+CVE_STATUS[CVE-2023-1077] = "cpe-stable-backport: Backported in versions v5.15.99 and v6.1.16"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2023-1078
|
|
|
# Patched in kernel 6.2 f753a68980cf4b59a80fe677619da2b1804f526d
|
|
|
# Backported in version 5.15.94 528e3f3a4b53df36dafd10cdf6b8c0fe2aa1c4ba
|
|
|
# Backported in version 6.1.12 1d52bbfd469af69fbcae88c67f160ce1b968e7f3
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1078"
|
|
|
+CVE_STATUS[CVE-2023-1078] = "cpe-stable-backport: Backported in versions v5.15.94 and v6.1.12"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2023-1079
|
|
|
# Patched in kernel since v6.3-rc1 4ab3a086d10eeec1424f2e8a968827a6336203df
|
|
@@ -432,7 +431,7 @@ CVE_CHECK_IGNORE += "CVE-2023-1078"
|
|
|
# Backported in version v5.15.99 3959316f8ceb17866646abc6be4a332655407138
|
|
|
# Backported in version v6.1.16 ee907829b36949c452c6f89485cb2a58e97c048e
|
|
|
# Backported in version v6.2.3 b08bcfb4c97d7bd41b362cff44b2c537ce9e8540
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1079"
|
|
|
+CVE_STATUS[CVE-2023-1079] = "cpe-stable-backport: Backported in versions v5.4.235, v5.10.173, v5.15.99, v6.1.16 and v6.2.3"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2023-1118
|
|
|
# Introduced in version v2.6.36 9ea53b74df9c4681f5bb2da6b2e10e37d87ea6d6
|
|
@@ -442,7 +441,7 @@ CVE_CHECK_IGNORE += "CVE-2023-1079"
|
|
|
# Backported in version v5.15.99 29962c478e8b2e6a6154d8d84b8806dbe36f9c28
|
|
|
# Backported in version v6.1.16 029c1410e345ce579db5c007276340d072aac54a
|
|
|
# Backported in version v6.2.3 182ea492aae5b64067277e60a4ea5995c4628555
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1118"
|
|
|
+CVE_STATUS[CVE-2023-1118] = "cpe-stable-backport: Backported in versions v5.4.235, v5.10.173, v5.15.99, v6.1.16 and v6.2.3"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2023-1281
|
|
|
# Introduced in version v4.14 9b0d4446b56904b59ae3809913b0ac760fa941a6
|
|
@@ -450,7 +449,7 @@ CVE_CHECK_IGNORE += "CVE-2023-1118"
|
|
|
# Backported in version v5.10.169 eb8e9d8572d1d9df17272783ad8a84843ce559d4
|
|
|
# Backported in version v5.15.95 becf55394f6acb60dd60634a1c797e73c747f9da
|
|
|
# Backported in version v6.1.13 bd662ba56187b5ef8a62a3511371cd38299a507f
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1281"
|
|
|
+CVE_STATUS[CVE-2023-1281] = "cpe-stable-backport: Backported in versions v5.10.169, v5.15.95 and v6.1.13"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2023-1513
|
|
|
# Patched in kernel since v6.2 2c10b61421a28e95a46ab489fd56c0f442ff6952
|
|
@@ -458,7 +457,7 @@ CVE_CHECK_IGNORE += "CVE-2023-1281"
|
|
|
# Backported in version v5.10.169 6416c2108ba54d569e4c98d3b62ac78cb12e7107
|
|
|
# Backported in version v5.15.95 35351e3060d67eed8af1575d74b71347a87425d8
|
|
|
# Backported in version v6.1.13 747ca7c8a0c7bce004709143d1cd6596b79b1deb
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1513"
|
|
|
+CVE_STATUS[CVE-2023-1513] = "cpe-stable-backport: Backported in versions v5.4.232, v5.10.169, v5.15.95 and v6.1.13"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2023-1652
|
|
|
# Patched in kernel since v6.2 e6cf91b7b47ff82b624bdfe2fdcde32bb52e71dd
|
|
@@ -466,7 +465,7 @@ CVE_CHECK_IGNORE += "CVE-2023-1513"
|
|
|
# Backported in version v6.1.9 32d5eb95f8f0e362e37c393310b13b9e95404560
|
|
|
# Ref: https://www.linuxkernelcves.com/cves/CVE-2023-1652
|
|
|
# Ref: Debian kernel-sec team: https://salsa.debian.org/kernel-team/kernel-sec/-/blob/1fa77554d4721da54e2df06fa1908a83ba6b1045/retired/CVE-2023-1652
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1652"
|
|
|
+CVE_STATUS[CVE-2023-1652] = "cpe-stable-backport: Backported in versions v5.15.91 and v6.1.9"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2023-1829
|
|
|
# Patched in kernel since v6.3-rc1 8c710f75256bb3cf05ac7b1672c82b92c43f3d28
|
|
@@ -477,178 +476,130 @@ CVE_CHECK_IGNORE += "CVE-2023-1652"
|
|
|
# Backported in version v6.2.5 372ae77cf11d11fb118cbe2d37def9dd5f826abd
|
|
|
# Ref: https://www.linuxkernelcves.com/cves/CVE-2023-1829
|
|
|
# Ref: Debian kernel-sec team : https://salsa.debian.org/kernel-team/kernel-sec/-/blob/1fa77554d4721da54e2df06fa1908a83ba6b1045/active/CVE-2023-1829
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1829"
|
|
|
+CVE_STATUS[CVE-2023-1829] = "cpe-stable-backport: Backported in versions v5.4.235, v5.10.173, v5.15.100, v6.1.18 and v6.2.5"
|
|
|
+
|
|
|
+# https://nvd.nist.gov/vuln/detail/CVE-2023-28466
|
|
|
+# Introduced in version v4.13 3c4d7559159bfe1e3b94df3a657b2cda3a34e218
|
|
|
+# Patched in kernel since v6.3-rc2 49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962
|
|
|
+# Backported in version v5.15.105 0b54d75aa43a1edebc8a3770901f5c3557ee0daa
|
|
|
+# Backported in version v6.1.20 14c17c673e1bba08032d245d5fb025d1cbfee123
|
|
|
+# Backported in version v6.2.7 5231fa057bb0e52095591b303cf95ebd17bc62ce
|
|
|
+CVE_STATUS[CVE-2023-28466] = "cpe-stable-backport: Backported in versions v5.15.05, v6.1.20 and v6.2.7"
|
|
|
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-0459
|
|
|
-# Fixed in 6.1.14 onwards
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-0459"
|
|
|
|
|
|
# https://www.linuxkernelcves.com/cves/CVE-2023-0615
|
|
|
# Fixed in 6.1 onwards
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-0615"
|
|
|
+CVE_STATUS[CVE-2023-0615] = "fixed-version: Fixed in version v6.1 onwards"
|
|
|
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-1380
|
|
|
-# Fixed in 6.1.27
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1380"
|
|
|
-
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-1611
|
|
|
-# Fixed in 6.1.23
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1611"
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-28328
|
|
|
+# Fixed with 6.1.2
|
|
|
+CVE_STATUS[CVE-2023-28328] = "fixed-version: Fixed in version v6.1.2"
|
|
|
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-1855
|
|
|
-# Fixed in 6.1.21
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1855"
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-2162
|
|
|
+# Fixed in 6.1.11
|
|
|
+CVE_STATUS[CVE-2023-2162] = "fixed-version: Fixed in version v6.1.11"
|
|
|
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-1859
|
|
|
-# Fixed in 6.1.25
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1859"
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-0459
|
|
|
+# Fixed in 6.1.14 onwards
|
|
|
+CVE_STATUS[CVE-2023-0459] = "fixed-version: Fixed in version v6.1.14"
|
|
|
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-1989
|
|
|
-# Fixed in 6.1.22
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1989"
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-1999
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-2985
|
|
|
+# Fixed in 6.1.16
|
|
|
+CVE_STATUS[CVE-2023-1998] = "fixed-version: Fixed in version v6.1.16"
|
|
|
+CVE_STATUS[CVE-2023-2985] = "fixed-version: Fixed in version v6.1.16"
|
|
|
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-1855
|
|
|
# https://www.linuxkernelcves.com/cves/CVE-2023-1990
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-2235
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-30456
|
|
|
# Fixed in 6.1.21
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1990"
|
|
|
+CVE_STATUS_GROUPS += "CVE_STATUS_KERNEL_6121"
|
|
|
+CVE_STATUS_KERNEL_6121 = "CVE-2023-1855 CVE-2023-1990 CVE-2023-2235 CVE-2023-30456"
|
|
|
+CVE_STATUS_KERNEL_6121[status] = "fixed-version: Fixed in version v6.1.21"
|
|
|
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-1999
|
|
|
-# Fixed in 6.1.16
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-1998"
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-1989
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-2194
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-28866
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-30772
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-33203
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-33288
|
|
|
+# Fixed with 6.1.22
|
|
|
+CVE_STATUS_GROUPS += "CVE_STATUS_KERNEL_6122"
|
|
|
+CVE_STATUS_KERNEL_6122 = "CVE-2023-2194 CVE-2023-1989 CVE-2023-28866 CVE-2023-30772 CVE-2023-33203 CVE-2023-33288"
|
|
|
+CVE_STATUS_KERNEL_6122[status] = "fixed-version: Fixed in version v6.1.22"
|
|
|
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-2002
|
|
|
-# Fixed in 6.1.27
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-2002"
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-1611
|
|
|
+# Fixed in 6.1.23
|
|
|
+CVE_STATUS[CVE-2023-1611] = "fixed-version: Fixed in version v6.1.23"
|
|
|
|
|
|
-# Backported to 6.1.33
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-2124"
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-1859
|
|
|
+# Fixed in 6.1.25
|
|
|
+CVE_STATUS[CVE-2023-1859] = "fixed-version: Fixed in version v6.1.25"
|
|
|
|
|
|
# https://www.linuxkernelcves.com/cves/CVE-2023-2156
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-31436
|
|
|
# Fixed in 6.1.26
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-2156"
|
|
|
-
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-2162
|
|
|
-# Fixed in 6.1.11
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-2162"
|
|
|
-
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-2194
|
|
|
-# Fixed with 6.1.22
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-2194"
|
|
|
+CVE_STATUS[CVE-2023-2156] = "fixed-version: Fixed in version v6.1.26"
|
|
|
+CVE_STATUS[CVE-2023-31436] = "fixed-version: Fixed in version v6.1.26"
|
|
|
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-2235
|
|
|
-# Fixed with 6.1.21
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-2235"
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-1380
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-2002
|
|
|
+# Fixed in 6.1.27
|
|
|
+CVE_STATUS[CVE-2023-1380] = "fixed-version: Fixed in version v6.1.27"
|
|
|
+CVE_STATUS[CVE-2023-2002] = "fixed-version: Fixed in version v6.1.27"
|
|
|
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-2985
|
|
|
-# Fixed in 6.1.16
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-2985"
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-32233
|
|
|
+# Fixed with 6.1.28
|
|
|
+CVE_STATUS[CVE-2023-32233] = "fixed-version: Fixed in version v6.1.28"
|
|
|
|
|
|
-# Backported to 6.1.30
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-3090"
|
|
|
+# https://www.linuxkernelcves.com/cves/CVE-2023-34256
|
|
|
+# Fixed in 6.1.29
|
|
|
+CVE_STATUS[CVE-2023-34256] = "fixed-version: Fixed in version v6.1.29"
|
|
|
|
|
|
-# Backported to 6.1.35
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-3117"
|
|
|
|
|
|
-# Backported to 6.1.30 as 9a342d4
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-3141"
|
|
|
+# Backported to 6.1.9
|
|
|
+CVE_STATUS[CVE-2023-3358] = "cpe-stable-backport: Backported in version v6.1.9"
|
|
|
|
|
|
# Backported to 6.1.11
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-3161"
|
|
|
-
|
|
|
-# Backported to 6.1.33
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-3212"
|
|
|
-
|
|
|
-# Only in 6.2.0 to 6.2.14, and 6.3.0 to 6.3.1
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-3312"
|
|
|
+CVE_STATUS[CVE-2023-3359] = "cpe-stable-backport: Backported in version v6.1.11"
|
|
|
+CVE_STATUS[CVE-2023-3161] = "cpe-stable-backport: Backported in version v6.1.11"
|
|
|
|
|
|
# Backported to 6.1.16
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-3220"
|
|
|
+CVE_STATUS[CVE-2023-3220] = "cpe-stable-backport: Backported in version v6.1.16"
|
|
|
|
|
|
# Backported to 6.1.28
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-3268"
|
|
|
+CVE_STATUS_GROUPS += "CVE_STATUS_KERNEL_6128"
|
|
|
+CVE_STATUS_KERNEL_6128 = "CVE-2023-3268 CVE-2023-35823 CVE-2023-35824 CVE-2023-35826 CVE-2023-35828 CVE-2023-35829"
|
|
|
+CVE_STATUS_KERNEL_6122[status] = "cpe-stable-backport: Backported in version v6.1.28"
|
|
|
|
|
|
-# Backported to 6.1.9
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-3358"
|
|
|
+# Backported to 6.1.30
|
|
|
+# Backported to 6.1.30 as 9a342d4
|
|
|
+CVE_STATUS[CVE-2023-3090] = "cpe-stable-backport: Backported in version v6.1.30"
|
|
|
+CVE_STATUS[CVE-2023-3141] = "cpe-stable-backport: Backported in version v6.1.30 as 9a342d4"
|
|
|
|
|
|
-# Backported to 6.1.11
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-3359"
|
|
|
+# Backported to 6.1.33
|
|
|
+CVE_STATUS_GROUPS += "CVE_STATUS_KERNEL_6133"
|
|
|
+CVE_STATUS_KERNEL_6133 = "CVE-2023-2124 CVE-2023-3212 CVE-2023-35788"
|
|
|
+CVE_STATUS_KERNEL_6133[status] = "cpe-stable-backport: Backported in version v6.1.33"
|
|
|
+
|
|
|
+# Backported to 6.1.35
|
|
|
+CVE_STATUS[CVE-2023-3117] = "cpe-stable-backport: Backported in version v6.1.35"
|
|
|
+CVE_STATUS[CVE-2023-3390] = "cpe-stable-backport: Backported in version v6.1.35"
|
|
|
|
|
|
# Backported to 6.1.36
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-3389"
|
|
|
+CVE_STATUS[CVE-2023-3389] = "cpe-stable-backport: Backported in version v6.1.36"
|
|
|
+
|
|
|
+# Only in 6.2.0 to 6.2.14, and 6.3.0 to 6.3.1
|
|
|
+CVE_STATUS[CVE-2023-3312] = "not-applicable-config: Only in versions v6.2.0 to v6.2.4 and v6.3.0 to v6.3.1"
|
|
|
|
|
|
-# Backported to 6.1.35
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-3390"
|
|
|
|
|
|
# https://nvd.nist.gov/vuln/detail/CVE-2023-23005
|
|
|
# Introduced in version v6.1 7b88bda3761b95856cf97822efe8281c8100067b
|
|
|
# Patched in kernel since v6.2 4a625ceee8a0ab0273534cb6b432ce6b331db5ee
|
|
|
# But, the CVE is disputed:
|
|
|
-# > NOTE: this is disputed by third parties because there are no realistic cases
|
|
|
-# > in which a user can cause the alloc_memory_type error case to be reached.
|
|
|
-# See: https://bugzilla.suse.com/show_bug.cgi?id=1208844#c2
|
|
|
-# We can safely ignore it.
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-23005"
|
|
|
-
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-28328
|
|
|
-# Fixed with 6.1.2
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-28328"
|
|
|
-
|
|
|
-# Only in 6.3-rc
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-28464"
|
|
|
-
|
|
|
-# https://nvd.nist.gov/vuln/detail/CVE-2023-28466
|
|
|
-# Introduced in version v4.13 3c4d7559159bfe1e3b94df3a657b2cda3a34e218
|
|
|
-# Patched in kernel since v6.3-rc2 49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962
|
|
|
-# Backported in version v5.15.105 0b54d75aa43a1edebc8a3770901f5c3557ee0daa
|
|
|
-# Backported in version v6.1.20 14c17c673e1bba08032d245d5fb025d1cbfee123
|
|
|
-# Backported in version v6.2.7 5231fa057bb0e52095591b303cf95ebd17bc62ce
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-28466"
|
|
|
+CVE_STATUS[CVE-2023-23005] = "disputed: There are no realistic cases \
|
|
|
+in which a user can cause the alloc_memory_type error case to be reached. \
|
|
|
+See: https://bugzilla.suse.com/show_bug.cgi?id=1208844#c2"
|
|
|
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-28866
|
|
|
-# Fixed with 6.1.22
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-28866"
|
|
|
-
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-30456
|
|
|
-# Fixed with 6.1.21
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-30456"
|
|
|
-
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-30772
|
|
|
-# Fixed with 6.1.22
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-30772"
|
|
|
-
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-31436
|
|
|
-# Fixed with 6.1.26
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-31436"
|
|
|
-
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-32233
|
|
|
-# Fixed with 6.1.28
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-32233"
|
|
|
-
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-33203
|
|
|
-# Fixed with 6.1.22
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-33203"
|
|
|
-
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-33288
|
|
|
-# Fixed with 6.1.22
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-33288"
|
|
|
-
|
|
|
-# https://www.linuxkernelcves.com/cves/CVE-2023-34256
|
|
|
-# Fixed in 6.1.29
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-34256"
|
|
|
-
|
|
|
-# Backported to 6.1.28
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-35823"
|
|
|
-
|
|
|
-# Backported to 6.1.28
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-35824"
|
|
|
-
|
|
|
-# Backported to 6.1.28
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-35826"
|
|
|
-
|
|
|
-# Backported to 6.1.28
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-35828"
|
|
|
-
|
|
|
-# Backported to 6.1.28
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-35829"
|
|
|
-
|
|
|
-# Backported to 6.1.33
|
|
|
-CVE_CHECK_IGNORE += "CVE-2023-35788"
|
|
|
+CVE_STATUS[CVE-2023-28464] = "not-applicable-config: Only in 6.3-rc"
|