Update 3May22
[ci skip]
diff --git a/CHANGES.md b/CHANGES.md
index 28d61cf..823f463 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -1,10 +1,26 @@
# **Linux Kernel CVE Changes**
-## Last Update - 29Apr22 15:28
+## Last Update - 03May22 06:46
### **New CVEs Added:**
-[CVE-2022-1516](cves/CVE-2022-1516)
+[CVE-2022-20008](cves/CVE-2022-20008)
+[CVE-2022-29968](cves/CVE-2022-29968)
+### **New Versions Checked:**
+
+[4.19.241](streams/4.19)
+[5.15.37](streams/5.15)
+
+
+### **Updated CVEs:**
+
+[CVE-2022-0500](cves/CVE-2022-0500)
+[CVE-2022-23222](cves/CVE-2022-23222)
+[CVE-2022-1011](cves/CVE-2022-1011)
+[CVE-2022-1015](cves/CVE-2022-1015)
+[CVE-2022-1048](cves/CVE-2022-1048)
+[CVE-2022-1195](cves/CVE-2022-1195)
+[CVE-2022-1353](cves/CVE-2022-1353)
diff --git a/data/4.14/4.14_CVEs.txt b/data/4.14/4.14_CVEs.txt
index 9881392..efcc7a2 100644
--- a/data/4.14/4.14_CVEs.txt
+++ b/data/4.14/4.14_CVEs.txt
@@ -795,6 +795,7 @@
CVE-2022-1419: Fix not seen in stream
CVE-2022-1508: Fix not seen in stream
CVE-2022-1516: Fixed with 4.14.276
+CVE-2022-20008: Fix not seen in stream
CVE-2022-22942: Fixed with 4.14.264
CVE-2022-23036: Fixed with 4.14.271
CVE-2022-23037: Fixed with 4.14.271
@@ -825,3 +826,4 @@
CVE-2022-28893: Fix not seen in stream
CVE-2022-29156: Fix not seen in stream
CVE-2022-29582: Fix not seen in stream
+CVE-2022-29968: Fix not seen in stream
diff --git a/data/4.14/4.14_security.txt b/data/4.14/4.14_security.txt
index f3245f5..803968b 100644
--- a/data/4.14/4.14_security.txt
+++ b/data/4.14/4.14_security.txt
@@ -1266,6 +1266,7 @@
CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector
CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create
CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters
+ CVE-2022-20008: (unk) mmc: block: fix read single on recovery logic
CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL
CVE-2022-25265: (unk)
CVE-2022-25636: (unk) netfilter: nf_tables_offload: incorrect flow offload action array size
@@ -1275,3 +1276,4 @@
CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()
CVE-2022-29156: (unk) RDMA/rtrs-clt: Fix possible double free in error case
CVE-2022-29582: (unk) io_uring: fix race between timeout flush and removal
+ CVE-2022-29968: (unk) io_uring: fix uninitialized field in rw io_kiocb
diff --git a/data/4.19/4.19_CVEs.txt b/data/4.19/4.19_CVEs.txt
index be7aea8..5164b8f 100644
--- a/data/4.19/4.19_CVEs.txt
+++ b/data/4.19/4.19_CVEs.txt
@@ -652,6 +652,7 @@
CVE-2022-1419: Fix not seen in stream
CVE-2022-1508: Fix not seen in stream
CVE-2022-1516: Fixed with 4.19.238
+CVE-2022-20008: Fixed with 4.19.231
CVE-2022-22942: Fixed with 4.19.227
CVE-2022-23036: Fixed with 4.19.234
CVE-2022-23037: Fixed with 4.19.234
@@ -683,3 +684,4 @@
CVE-2022-28893: Fix not seen in stream
CVE-2022-29156: Fix not seen in stream
CVE-2022-29582: Fix not seen in stream
+CVE-2022-29968: Fix not seen in stream
diff --git a/data/4.19/4.19_security.txt b/data/4.19/4.19_security.txt
index 0aaed0a..9e63b1c 100644
--- a/data/4.19/4.19_security.txt
+++ b/data/4.19/4.19_security.txt
@@ -875,6 +875,9 @@
CVE-2022-25258: e5eb8d19aee115d8fb354d1eff1b8df700467164 USB: gadget: validate interface OS descriptor requests
CVE-2022-25375: db9aaa3026298d652e98f777bc0f5756e2455dda usb: gadget: rndis: check size of RNDIS_MSG_SET command
+CVEs fixed in 4.19.231:
+ CVE-2022-20008: c91b06297563e84ac072464fe6cc141cc15435f0 mmc: block: fix read single on recovery logic
+
CVEs fixed in 4.19.232:
CVE-2022-26966: dde5ddf02a47487dd6efcc7077307f1d4e1ba337 sr9700: sanity check for packet length
CVE-2022-27223: ebc465e894890a534ce05e035eae4829a2a47ba1 USB: gadget: validate endpoint index for xilinx udc
@@ -1055,3 +1058,4 @@
CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()
CVE-2022-29156: (unk) RDMA/rtrs-clt: Fix possible double free in error case
CVE-2022-29582: (unk) io_uring: fix race between timeout flush and removal
+ CVE-2022-29968: (unk) io_uring: fix uninitialized field in rw io_kiocb
diff --git a/data/4.4/4.4_CVEs.txt b/data/4.4/4.4_CVEs.txt
index d7aef6b..19c9c55 100644
--- a/data/4.4/4.4_CVEs.txt
+++ b/data/4.4/4.4_CVEs.txt
@@ -981,6 +981,7 @@
CVE-2022-1419: Fix not seen in stream
CVE-2022-1508: Fix not seen in stream
CVE-2022-1516: Fix not seen in stream
+CVE-2022-20008: Fix not seen in stream
CVE-2022-23036: Fix not seen in stream
CVE-2022-23037: Fix not seen in stream
CVE-2022-23038: Fix not seen in stream
@@ -1009,3 +1010,4 @@
CVE-2022-28893: Fix not seen in stream
CVE-2022-29156: Fix not seen in stream
CVE-2022-29582: Fix not seen in stream
+CVE-2022-29968: Fix not seen in stream
diff --git a/data/4.4/4.4_security.txt b/data/4.4/4.4_security.txt
index 9910b12..6790966 100644
--- a/data/4.4/4.4_security.txt
+++ b/data/4.4/4.4_security.txt
@@ -1465,6 +1465,7 @@
CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create
CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters
CVE-2022-1516: (unk) net/x25: Fix null-ptr-deref caused by x25_disconnect
+ CVE-2022-20008: (unk) mmc: block: fix read single on recovery logic
CVE-2022-23036: (unk) xen/grant-table: add gnttab_try_end_foreign_access()
CVE-2022-23037: (unk) xen/netfront: don't use gnttab_query_foreign_access() for mapped status
CVE-2022-23038: (unk) xen/grant-table: add gnttab_try_end_foreign_access()
@@ -1493,3 +1494,4 @@
CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()
CVE-2022-29156: (unk) RDMA/rtrs-clt: Fix possible double free in error case
CVE-2022-29582: (unk) io_uring: fix race between timeout flush and removal
+ CVE-2022-29968: (unk) io_uring: fix uninitialized field in rw io_kiocb
diff --git a/data/4.9/4.9_CVEs.txt b/data/4.9/4.9_CVEs.txt
index c099398..04dfaca 100644
--- a/data/4.9/4.9_CVEs.txt
+++ b/data/4.9/4.9_CVEs.txt
@@ -917,6 +917,7 @@
CVE-2022-1419: Fix not seen in stream
CVE-2022-1508: Fix not seen in stream
CVE-2022-1516: Fixed with 4.9.311
+CVE-2022-20008: Fix not seen in stream
CVE-2022-23036: Fixed with 4.9.306
CVE-2022-23037: Fixed with 4.9.306
CVE-2022-23038: Fixed with 4.9.306
@@ -945,3 +946,4 @@
CVE-2022-28893: Fix not seen in stream
CVE-2022-29156: Fix not seen in stream
CVE-2022-29582: Fix not seen in stream
+CVE-2022-29968: Fix not seen in stream
diff --git a/data/4.9/4.9_security.txt b/data/4.9/4.9_security.txt
index a51ce6a..90a18cc 100644
--- a/data/4.9/4.9_security.txt
+++ b/data/4.9/4.9_security.txt
@@ -1433,6 +1433,7 @@
CVE-2022-1280: (unk) drm: avoid circular locks in drm_mode_getconnector
CVE-2022-1419: (unk) drm/vgem: Close use-after-free race in vgem_gem_create
CVE-2022-1508: (unk) io_uring: reexpand under-reexpanded iters
+ CVE-2022-20008: (unk) mmc: block: fix read single on recovery logic
CVE-2022-23041: (unk) xen/9p: use alloc/free_pages_exact()
CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL
CVE-2022-25265: (unk)
@@ -1445,3 +1446,4 @@
CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()
CVE-2022-29156: (unk) RDMA/rtrs-clt: Fix possible double free in error case
CVE-2022-29582: (unk) io_uring: fix race between timeout flush and removal
+ CVE-2022-29968: (unk) io_uring: fix uninitialized field in rw io_kiocb
diff --git a/data/5.10/5.10_CVEs.txt b/data/5.10/5.10_CVEs.txt
index 42c67cb..1f63077 100644
--- a/data/5.10/5.10_CVEs.txt
+++ b/data/5.10/5.10_CVEs.txt
@@ -289,6 +289,7 @@
CVE-2022-1353: Fixed with 5.10.110
CVE-2022-1508: Fix not seen in stream
CVE-2022-1516: Fixed with 5.10.110
+CVE-2022-20008: Fixed with 5.10.102
CVE-2022-22942: Fixed with 5.10.95
CVE-2022-23036: Fixed with 5.10.105
CVE-2022-23037: Fixed with 5.10.105
@@ -320,3 +321,4 @@
CVE-2022-28893: Fix not seen in stream
CVE-2022-29156: Fixed with 5.10.103
CVE-2022-29582: Fixed with 5.10.111
+CVE-2022-29968: Fix not seen in stream
diff --git a/data/5.10/5.10_security.txt b/data/5.10/5.10_security.txt
index d6a3564..dcd7c47 100644
--- a/data/5.10/5.10_security.txt
+++ b/data/5.10/5.10_security.txt
@@ -335,6 +335,7 @@
CVEs fixed in 5.10.102:
CVE-2022-0847: b19ec7afa9297d862ed86443e0164643b97250ab lib/iov_iter: initialize "flags" in new pipe_buffer
+ CVE-2022-20008: ab2b4e65a130d67478bd5b35ca9004b2075805fa mmc: block: fix read single on recovery logic
CVEs fixed in 5.10.103:
CVE-2022-25636: 68f19845f580a1d3ac1ef40e95b0250804e046bb netfilter: nf_tables_offload: incorrect flow offload action array size
@@ -480,3 +481,4 @@
CVE-2022-27950: (unk) HID: elo: fix memory leak in elo_probe
CVE-2022-28796: (unk) jbd2: fix use-after-free of transaction_t race
CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()
+ CVE-2022-29968: (unk) io_uring: fix uninitialized field in rw io_kiocb
diff --git a/data/5.15/5.15_CVEs.txt b/data/5.15/5.15_CVEs.txt
index 78b35c3..b862a47 100644
--- a/data/5.15/5.15_CVEs.txt
+++ b/data/5.15/5.15_CVEs.txt
@@ -105,7 +105,7 @@
CVE-2022-0487: Fixed with 5.15.23
CVE-2022-0492: Fixed with 5.15.20
CVE-2022-0494: Fixed with 5.15.27
-CVE-2022-0500: Fix not seen in stream
+CVE-2022-0500: Fixed with 5.15.37
CVE-2022-0516: Fixed with 5.15.23
CVE-2022-0617: Fixed with 5.15.19
CVE-2022-0742: Fixed with 5.15.27
@@ -128,6 +128,7 @@
CVE-2022-1263: Fixed with 5.15.34
CVE-2022-1353: Fixed with 5.15.33
CVE-2022-1516: Fixed with 5.15.33
+CVE-2022-20008: Fixed with 5.15.25
CVE-2022-22942: Fixed with 5.15.18
CVE-2022-23036: Fixed with 5.15.28
CVE-2022-23037: Fixed with 5.15.28
@@ -136,7 +137,7 @@
CVE-2022-23040: Fixed with 5.15.28
CVE-2022-23041: Fixed with 5.15.28
CVE-2022-23042: Fixed with 5.15.28
-CVE-2022-23222: Fix not seen in stream
+CVE-2022-23222: Fixed with 5.15.37
CVE-2022-23960: Fixed with 5.15.28
CVE-2022-24122: Fix not seen in stream
CVE-2022-24448: Fixed with 5.15.19
@@ -160,3 +161,4 @@
CVE-2022-28893: Fix not seen in stream
CVE-2022-29156: Fixed with 5.15.26
CVE-2022-29582: Fixed with 5.15.34
+CVE-2022-29968: Fix not seen in stream
diff --git a/data/5.15/5.15_security.txt b/data/5.15/5.15_security.txt
index b265f1e..caa5f24 100644
--- a/data/5.15/5.15_security.txt
+++ b/data/5.15/5.15_security.txt
@@ -86,6 +86,7 @@
CVEs fixed in 5.15.25:
CVE-2022-0847: 114e9f141822e6977633d322c1b03e89bd209932 lib/iov_iter: initialize "flags" in new pipe_buffer
+ CVE-2022-20008: f3ff5f75d8f6367eac7556c9db1227bb43e5c615 mmc: block: fix read single on recovery logic
CVE-2022-27950: de0d102d0c8c681fc9a3263d842fb35f7cf662f4 HID: elo: fix memory leak in elo_probe
CVEs fixed in 5.15.26:
@@ -143,6 +144,10 @@
CVE-2022-1204: 452ae92b99062d2f6a34324eaf705a3b7eac9f8b ax25: Fix refcount leaks caused by ax25_cb_del()
CVE-2022-1205: 43c107021d9160f6a1610bafba6dadc0323ae548 ax25: Fix NULL pointer dereferences in ax25 timers
+CVEs fixed in 5.15.37:
+ CVE-2022-0500: b453361384c2db1c703dacb806d5fd36aec4ceca bpf: Introduce MEM_RDONLY flag
+ CVE-2022-23222: 8d38cde47a7e17b646401fa92d916503caa5375e bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL
+
Outstanding CVEs:
CVE-2005-3660: (unk)
CVE-2007-3719: (unk)
@@ -205,12 +210,11 @@
CVE-2021-4095: (unk) KVM: x86: Fix wall clock writes in Xen shared_info not to mark page dirty
CVE-2021-4204: (unk) bpf: Generalize check_ctx_reg for reuse with other types
CVE-2022-0400: (unk)
- CVE-2022-0500: (unk) bpf: Introduce MEM_RDONLY flag
CVE-2022-0998: (unk) vdpa: clean up get_config_size ret value handling
CVE-2022-1184: (unk)
- CVE-2022-23222: (unk) bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL
CVE-2022-24122: (unk) ucount: Make get_ucount a safe get_user replacement
CVE-2022-25265: (unk)
CVE-2022-26878: (unk)
CVE-2022-28796: (unk) jbd2: fix use-after-free of transaction_t race
CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()
+ CVE-2022-29968: (unk) io_uring: fix uninitialized field in rw io_kiocb
diff --git a/data/5.16/5.16_CVEs.txt b/data/5.16/5.16_CVEs.txt
index 500fc20..b66ee90 100644
--- a/data/5.16/5.16_CVEs.txt
+++ b/data/5.16/5.16_CVEs.txt
@@ -97,6 +97,7 @@
CVE-2022-1263: Fixed with 5.16.20
CVE-2022-1353: Fixed with 5.16.19
CVE-2022-1516: Fixed with 5.16.19
+CVE-2022-20008: Fixed with 5.16.11
CVE-2022-22942: Fixed with 5.16.4
CVE-2022-23036: Fixed with 5.16.14
CVE-2022-23037: Fixed with 5.16.14
@@ -129,3 +130,4 @@
CVE-2022-28893: Fixed with 5.16.20
CVE-2022-29156: Fixed with 5.16.12
CVE-2022-29582: Fixed with 5.16.20
+CVE-2022-29968: Fix not seen in stream
diff --git a/data/5.16/5.16_security.txt b/data/5.16/5.16_security.txt
index 2f9176e..1d0c095 100644
--- a/data/5.16/5.16_security.txt
+++ b/data/5.16/5.16_security.txt
@@ -38,6 +38,7 @@
CVEs fixed in 5.16.11:
CVE-2022-0500: e982070f8970bb62e69ed7c9cafff886ed200349 bpf: Introduce MEM_RDONLY flag
CVE-2022-0847: eddef98207d678f21261c2bd07da55938680df4e lib/iov_iter: initialize "flags" in new pipe_buffer
+ CVE-2022-20008: cccf23c660cc96c5687335d73cad103e983e6165 mmc: block: fix read single on recovery logic
CVE-2022-23222: 77459bc4d5e2c6f24db845780b4d9d60cf82d06a bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL
CVE-2022-27950: 80dad7483e3940dc9d9d55f8b34d1f4ba85a505e HID: elo: fix memory leak in elo_probe
@@ -163,3 +164,4 @@
CVE-2022-25265: (unk)
CVE-2022-26878: (unk)
CVE-2022-28796: (unk) jbd2: fix use-after-free of transaction_t race
+ CVE-2022-29968: (unk) io_uring: fix uninitialized field in rw io_kiocb
diff --git a/data/5.17/5.17_CVEs.txt b/data/5.17/5.17_CVEs.txt
index 1006ac0..4c93450 100644
--- a/data/5.17/5.17_CVEs.txt
+++ b/data/5.17/5.17_CVEs.txt
@@ -77,3 +77,4 @@
CVE-2022-28796: Fixed with 5.17.1
CVE-2022-28893: Fixed with 5.17.3
CVE-2022-29582: Fixed with 5.17.3
+CVE-2022-29968: Fix not seen in stream
diff --git a/data/5.17/5.17_security.txt b/data/5.17/5.17_security.txt
index 5072861..d737914 100644
--- a/data/5.17/5.17_security.txt
+++ b/data/5.17/5.17_security.txt
@@ -87,3 +87,4 @@
CVE-2022-1184: (unk)
CVE-2022-25265: (unk)
CVE-2022-26878: (unk)
+ CVE-2022-29968: (unk) io_uring: fix uninitialized field in rw io_kiocb
diff --git a/data/5.4/5.4_CVEs.txt b/data/5.4/5.4_CVEs.txt
index 2f12cfe..74d0f46 100644
--- a/data/5.4/5.4_CVEs.txt
+++ b/data/5.4/5.4_CVEs.txt
@@ -445,6 +445,7 @@
CVE-2022-1419: Fixed with 5.4.21
CVE-2022-1508: Fix not seen in stream
CVE-2022-1516: Fixed with 5.4.189
+CVE-2022-20008: Fixed with 5.4.181
CVE-2022-22942: Fixed with 5.4.175
CVE-2022-23036: Fixed with 5.4.184
CVE-2022-23037: Fixed with 5.4.184
@@ -476,3 +477,4 @@
CVE-2022-28893: Fix not seen in stream
CVE-2022-29156: Fix not seen in stream
CVE-2022-29582: Fix not seen in stream
+CVE-2022-29968: Fix not seen in stream
diff --git a/data/5.4/5.4_security.txt b/data/5.4/5.4_security.txt
index 248527d..a1aa1b9 100644
--- a/data/5.4/5.4_security.txt
+++ b/data/5.4/5.4_security.txt
@@ -603,6 +603,9 @@
CVE-2022-25258: 38fd68f55a7ef57fb9cc3102ac65d1ac474a1a18 USB: gadget: validate interface OS descriptor requests
CVE-2022-25375: c9e952871ae47af784b4aef0a77db02e557074d6 usb: gadget: rndis: check size of RNDIS_MSG_SET command
+CVEs fixed in 5.4.181:
+ CVE-2022-20008: 902528183f4d94945a0c1ed6048d4a5d4e1e712e mmc: block: fix read single on recovery logic
+
CVEs fixed in 5.4.182:
CVE-2022-25636: 49c011a44edd14adb555dbcbaf757f52b1f2f748 netfilter: nf_tables_offload: incorrect flow offload action array size
CVE-2022-26966: b95d71abeb7d31d4d51cd836d80f99fd783fd6d5 sr9700: sanity check for packet length
@@ -760,3 +763,4 @@
CVE-2022-28893: (unk) SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()
CVE-2022-29156: (unk) RDMA/rtrs-clt: Fix possible double free in error case
CVE-2022-29582: (unk) io_uring: fix race between timeout flush and removal
+ CVE-2022-29968: (unk) io_uring: fix uninitialized field in rw io_kiocb
diff --git a/data/CVEs.txt b/data/CVEs.txt
index 1a8200e..28307b1 100644
--- a/data/CVEs.txt
+++ b/data/CVEs.txt
@@ -1997,6 +1997,7 @@
CVE-2022-1419: (n/a) - 4b848f20eda5974020f043ca14bacf7a7e634fc8 (unk to v5.6-rc2)
CVE-2022-1508: (n/a) - 89c2b3b74918200e46699338d7bcc19b1ea12110 (unk to v5.15-rc1)
CVE-2022-1516: (n/a) - 7781607938c8371d4c2b243527430241c62e39c2 (unk to v5.18-rc1)
+CVE-2022-20008: (n/a) - 54309fde1a352ad2674ebba004a79f7d20b9f037 (unk to v5.17-rc5)
CVE-2022-22942: c906965dee22d5e95d0651759ba107b420212a9f - a0f90c8815706981c483a652a6aefca51a5e191c (v4.14-rc1 to v5.17-rc2)
CVE-2022-23036: (n/a) - 6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a (unk to v5.17-rc8)
CVE-2022-23037: (n/a) - 31185df7e2b1d2fa1de4900247a12d7b9c7087eb (unk to v5.17-rc8)
@@ -2029,3 +2030,4 @@
CVE-2022-28893: (n/a) - f00432063db1a0db484e85193eccc6845435b80e (unk to v5.18-rc2)
CVE-2022-29156: (n/a) - 8700af2cc18c919b2a83e74e0479038fd113c15d (unk to v5.17-rc6)
CVE-2022-29582: (n/a) - e677edbcabee849bfdd43f1602bccbecf736a646 (unk to v5.18-rc2)
+CVE-2022-29968: (n/a) - 32452a3eb8b64e01e2be717f518c0be046975b9d (unk to v5.18-rc5)
diff --git a/data/cmts.json b/data/cmts.json
index 552d703..e3d5485 100644
--- a/data/cmts.json
+++ b/data/cmts.json
@@ -550,6 +550,7 @@
"320b2b8de12698082609ebbc1a17165727f4c893": "v2.6.36-rc1",
"321027c1fe77f892f4ea07846aeae08cefbbb290": "v4.10-rc4",
"324420bf91f60582bb481133db9547111768ef17": "v4.6-rc1",
+ "32452a3eb8b64e01e2be717f518c0be046975b9d": "v5.18-rc5",
"327455817a92522e669d2d11367e42af5956a8ed": "v3.18-rc1",
"3289025aedc018f8fd9d0e37fb9efa0c6d531ffa": "v4.11-rc1",
"32927393dc1ccd60fb2bdc05b9e8e88753761469": "v5.8-rc1",
@@ -901,6 +902,7 @@
"53a712bae5dd919521a58d7bad773b949358add0": "v5.2-rc1",
"53b381b3abeb86f12787a6c40fee9b2f71edc23b": "v3.9-rc1",
"542db01579fbb7ea7d1f7bb9ddcef1559df660b2": "v3.11-rc1",
+ "54309fde1a352ad2674ebba004a79f7d20b9f037": "v5.17-rc5",
"54648cf1ec2d7f4b6a71767799c45676a138ca24": "v4.19-rc1",
"548acf19234dbda5a52d5a8e7e205af46e9da840": "v4.6-rc1",
"54a20552e1eae07aa240fa370a0293e006b5faed": "v4.4-rc1",
diff --git a/data/kernel_cves.json b/data/kernel_cves.json
index 6f77528..f6c0013 100644
--- a/data/kernel_cves.json
+++ b/data/kernel_cves.json
@@ -69146,7 +69146,7 @@
"cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"fixes": "20b2aff4bc15bda809f994761d5719827d66c0b4",
"last_affected_version": "5.16.10",
- "last_modified": "2022-04-15",
+ "last_modified": "2022-05-03",
"nvd_text": "A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel\u2019s BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0500",
@@ -69552,8 +69552,8 @@
"cwe": "Use After Free",
"fixes": "0c4bcfdecb1ac0967619ee7ff44871d93c08c909",
"last_affected_version": "5.16.14",
- "last_modified": "2022-04-22",
- "nvd_text": "A flaw use after free in the Linux kernel FUSE filesystem was found in the way user triggers write(). A local user could use this flaw to get some unauthorized access to some data from the FUSE filesystem and as result potentially privilege escalation too.",
+ "last_modified": "2022-05-03",
+ "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1011",
"ExploitDB": "https://www.exploit-db.com/search?cve=2022-1011",
@@ -69569,7 +69569,8 @@
"cmt_msg": "netfilter: nf_tables: validate registers coming from userspace.",
"fixes": "6e1acfa387b9ff82cfc7db8cc3b6959221a95851",
"last_affected_version": "5.17.0",
- "last_modified": "2022-04-15",
+ "last_modified": "2022-05-03",
+ "nvd_text": "A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1015",
"ExploitDB": "https://www.exploit-db.com/search?cve=2022-1015",
@@ -69617,7 +69618,8 @@
"cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls",
"fixes": "92ee3c60ec9fe64404dc035e7c41277d74aa26cb",
"last_affected_version": "5.17.0",
- "last_modified": "2022-04-15",
+ "last_modified": "2022-05-03",
+ "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1048",
"ExploitDB": "https://www.exploit-db.com/search?cve=2022-1048",
@@ -69703,7 +69705,8 @@
"cmt_msg": "hamradio: improve the incomplete fix to avoid NPD",
"fixes": "b2f37aead1b82a770c48b5d583f35ec22aabb61e",
"last_affected_version": "5.15.11",
- "last_modified": "2022-04-04",
+ "last_modified": "2022-05-03",
+ "nvd_text": "A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1195",
"ExploitDB": "https://www.exploit-db.com/search?cve=2022-1195",
@@ -69838,7 +69841,8 @@
"cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register",
"fixes": "9a564bccb78a76740ea9d75a259942df8143d02c",
"last_affected_version": "5.16",
- "last_modified": "2022-04-22",
+ "last_modified": "2022-05-03",
+ "nvd_text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1353",
"ExploitDB": "https://www.exploit-db.com/search?cve=2022-1353",
@@ -69895,6 +69899,22 @@
"Ubuntu": "https://ubuntu.com/security/CVE-2022-1516"
}
},
+ "CVE-2022-20008": {
+ "affected_versions": "unk to v5.17-rc5",
+ "breaks": "",
+ "cmt_msg": "mmc: block: fix read single on recovery logic",
+ "fixes": "54309fde1a352ad2674ebba004a79f7d20b9f037",
+ "last_affected_version": "5.16.10",
+ "last_modified": "2022-05-03",
+ "ref_urls": {
+ "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20008",
+ "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20008",
+ "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20008",
+ "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20008",
+ "SUSE": "https://www.suse.com/security/cve/CVE-2022-20008",
+ "Ubuntu": "https://ubuntu.com/security/CVE-2022-20008"
+ }
+ },
"CVE-2022-22942": {
"affected_versions": "v4.14-rc1 to v5.17-rc2",
"breaks": "c906965dee22d5e95d0651759ba107b420212a9f",
@@ -70220,7 +70240,7 @@
"cwe": "NULL Pointer Dereference",
"fixes": "c25b2ae136039ffa820c26138ed4a5e5f3ab3841",
"last_affected_version": "5.16.10",
- "last_modified": "2022-02-28",
+ "last_modified": "2022-05-03",
"nvd_text": "kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23222",
@@ -71122,5 +71142,21 @@
"SUSE": "https://www.suse.com/security/cve/CVE-2022-29582",
"Ubuntu": "https://ubuntu.com/security/CVE-2022-29582"
}
+ },
+ "CVE-2022-29968": {
+ "affected_versions": "unk to v5.18-rc5",
+ "breaks": "",
+ "cmt_msg": "io_uring: fix uninitialized field in rw io_kiocb",
+ "fixes": "32452a3eb8b64e01e2be717f518c0be046975b9d",
+ "last_modified": "2022-05-03",
+ "nvd_text": "An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb->private.",
+ "ref_urls": {
+ "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-29968",
+ "ExploitDB": "https://www.exploit-db.com/search?cve=2022-29968",
+ "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-29968",
+ "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-29968",
+ "SUSE": "https://www.suse.com/security/cve/CVE-2022-29968",
+ "Ubuntu": "https://ubuntu.com/security/CVE-2022-29968"
+ }
}
}
\ No newline at end of file
diff --git a/data/stream_data.json b/data/stream_data.json
index f5adf8e..5b17ab0 100644
--- a/data/stream_data.json
+++ b/data/stream_data.json
@@ -3890,6 +3890,9 @@
"CVE-2012-4542": {
"cmt_msg": ""
},
+ "CVE-2022-29968": {
+ "cmt_msg": "io_uring: fix uninitialized field in rw io_kiocb"
+ },
"CVE-2021-3894": {
"cmt_msg": "sctp: account stream padding length for reconf chunk"
},
@@ -4052,6 +4055,9 @@
"CVE-2020-12888": {
"cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory"
},
+ "CVE-2022-20008": {
+ "cmt_msg": "mmc: block: fix read single on recovery logic"
+ },
"CVE-2019-12456": {
"cmt_msg": ""
},
@@ -5904,6 +5910,12 @@
"cmt_id": "38fd68f55a7ef57fb9cc3102ac65d1ac474a1a18"
}
},
+ "5.4.181": {
+ "CVE-2022-20008": {
+ "cmt_msg": "mmc: block: fix read single on recovery logic",
+ "cmt_id": "902528183f4d94945a0c1ed6048d4a5d4e1e712e"
+ }
+ },
"5.4.182": {
"CVE-2022-25636": {
"cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size",
@@ -6200,6 +6212,9 @@
"CVE-2021-4148": {
"cmt_msg": "mm: khugepaged: skip huge page collapse for special files"
},
+ "CVE-2022-29968": {
+ "cmt_msg": "io_uring: fix uninitialized field in rw io_kiocb"
+ },
"CVE-2013-7445": {
"cmt_msg": ""
},
@@ -9739,6 +9754,9 @@
"CVE-2012-4542": {
"cmt_msg": ""
},
+ "CVE-2022-29968": {
+ "cmt_msg": "io_uring: fix uninitialized field in rw io_kiocb"
+ },
"CVE-2022-0812": {
"cmt_msg": "xprtrdma: fix incorrect header size calculations"
},
@@ -9832,6 +9850,9 @@
"CVE-2022-1184": {
"cmt_msg": ""
},
+ "CVE-2022-20008": {
+ "cmt_msg": "mmc: block: fix read single on recovery logic"
+ },
"CVE-2020-26141": {
"cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe"
},
@@ -12412,6 +12433,12 @@
"cmt_id": "e5eb8d19aee115d8fb354d1eff1b8df700467164"
}
},
+ "4.19.231": {
+ "CVE-2022-20008": {
+ "cmt_msg": "mmc: block: fix read single on recovery logic",
+ "cmt_id": "c91b06297563e84ac072464fe6cc141cc15435f0"
+ }
+ },
"4.19.232": {
"CVE-2022-27223": {
"cmt_msg": "USB: gadget: validate endpoint index for xilinx udc",
@@ -12741,6 +12768,9 @@
"CVE-2012-4542": {
"cmt_msg": ""
},
+ "CVE-2022-29968": {
+ "cmt_msg": "io_uring: fix uninitialized field in rw io_kiocb"
+ },
"CVE-2022-0812": {
"cmt_msg": "xprtrdma: fix incorrect header size calculations"
},
@@ -16742,6 +16772,9 @@
"CVE-2012-4542": {
"cmt_msg": ""
},
+ "CVE-2022-29968": {
+ "cmt_msg": "io_uring: fix uninitialized field in rw io_kiocb"
+ },
"CVE-2022-0812": {
"cmt_msg": "xprtrdma: fix incorrect header size calculations"
},
@@ -16868,6 +16901,9 @@
"CVE-2022-1184": {
"cmt_msg": ""
},
+ "CVE-2022-20008": {
+ "cmt_msg": "mmc: block: fix read single on recovery logic"
+ },
"CVE-2021-3894": {
"cmt_msg": "sctp: account stream padding length for reconf chunk"
},
@@ -17968,6 +18004,10 @@
}
},
"5.10.102": {
+ "CVE-2022-20008": {
+ "cmt_msg": "mmc: block: fix read single on recovery logic",
+ "cmt_id": "ab2b4e65a130d67478bd5b35ca9004b2075805fa"
+ },
"CVE-2022-0847": {
"cmt_msg": "lib/iov_iter: initialize \"flags\" in new pipe_buffer",
"cmt_id": "b19ec7afa9297d862ed86443e0164643b97250ab"
@@ -18267,6 +18307,9 @@
"CVE-2012-4542": {
"cmt_msg": ""
},
+ "CVE-2022-29968": {
+ "cmt_msg": "io_uring: fix uninitialized field in rw io_kiocb"
+ },
"CVE-2013-7445": {
"cmt_msg": ""
},
@@ -18510,6 +18553,10 @@
"cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL",
"cmt_id": "77459bc4d5e2c6f24db845780b4d9d60cf82d06a"
},
+ "CVE-2022-20008": {
+ "cmt_msg": "mmc: block: fix read single on recovery logic",
+ "cmt_id": "cccf23c660cc96c5687335d73cad103e983e6165"
+ },
"CVE-2022-0847": {
"cmt_msg": "lib/iov_iter: initialize \"flags\" in new pipe_buffer",
"cmt_id": "eddef98207d678f21261c2bd07da55938680df4e"
@@ -18878,6 +18925,9 @@
"CVE-2012-4542": {
"cmt_msg": ""
},
+ "CVE-2022-29968": {
+ "cmt_msg": "io_uring: fix uninitialized field in rw io_kiocb"
+ },
"CVE-2021-4095": {
"cmt_msg": "KVM: x86: Fix wall clock writes in Xen shared_info not to mark page dirty"
},
@@ -19147,6 +19197,9 @@
"CVE-2012-4542": {
"cmt_msg": ""
},
+ "CVE-2022-29968": {
+ "cmt_msg": "io_uring: fix uninitialized field in rw io_kiocb"
+ },
"CVE-2019-15290": {
"cmt_msg": ""
},
@@ -19401,6 +19454,10 @@
}
},
"5.15.25": {
+ "CVE-2022-20008": {
+ "cmt_msg": "mmc: block: fix read single on recovery logic",
+ "cmt_id": "f3ff5f75d8f6367eac7556c9db1227bb43e5c615"
+ },
"CVE-2022-0847": {
"cmt_msg": "lib/iov_iter: initialize \"flags\" in new pipe_buffer",
"cmt_id": "114e9f141822e6977633d322c1b03e89bd209932"
@@ -19582,6 +19639,16 @@
"cmt_id": "43c107021d9160f6a1610bafba6dadc0323ae548"
}
},
+ "5.15.37": {
+ "CVE-2022-0500": {
+ "cmt_msg": "bpf: Introduce MEM_RDONLY flag",
+ "cmt_id": "b453361384c2db1c703dacb806d5fd36aec4ceca"
+ },
+ "CVE-2022-23222": {
+ "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL",
+ "cmt_id": "8d38cde47a7e17b646401fa92d916503caa5375e"
+ }
+ },
"outstanding": {
"CVE-2018-17977": {
"cmt_msg": ""
@@ -19664,9 +19731,6 @@
"CVE-2020-0347": {
"cmt_msg": ""
},
- "CVE-2022-0500": {
- "cmt_msg": "bpf: Introduce MEM_RDONLY flag"
- },
"CVE-2010-4563": {
"cmt_msg": ""
},
@@ -19772,12 +19836,12 @@
"CVE-2020-36516": {
"cmt_msg": ""
},
- "CVE-2022-23222": {
- "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL"
- },
"CVE-2012-4542": {
"cmt_msg": ""
},
+ "CVE-2022-29968": {
+ "cmt_msg": "io_uring: fix uninitialized field in rw io_kiocb"
+ },
"CVE-2021-4095": {
"cmt_msg": "KVM: x86: Fix wall clock writes in Xen shared_info not to mark page dirty"
},
diff --git a/data/stream_fixes.json b/data/stream_fixes.json
index a31203b..bdf70c7 100644
--- a/data/stream_fixes.json
+++ b/data/stream_fixes.json
@@ -30204,6 +30204,10 @@
}
},
"CVE-2022-0500": {
+ "5.15": {
+ "cmt_id": "b453361384c2db1c703dacb806d5fd36aec4ceca",
+ "fixed_version": "5.15.37"
+ },
"5.16": {
"cmt_id": "e982070f8970bb62e69ed7c9cafff886ed200349",
"fixed_version": "5.16.11"
@@ -30743,6 +30747,28 @@
"fixed_version": "5.4.189"
}
},
+ "CVE-2022-20008": {
+ "4.19": {
+ "cmt_id": "c91b06297563e84ac072464fe6cc141cc15435f0",
+ "fixed_version": "4.19.231"
+ },
+ "5.10": {
+ "cmt_id": "ab2b4e65a130d67478bd5b35ca9004b2075805fa",
+ "fixed_version": "5.10.102"
+ },
+ "5.15": {
+ "cmt_id": "f3ff5f75d8f6367eac7556c9db1227bb43e5c615",
+ "fixed_version": "5.15.25"
+ },
+ "5.16": {
+ "cmt_id": "cccf23c660cc96c5687335d73cad103e983e6165",
+ "fixed_version": "5.16.11"
+ },
+ "5.4": {
+ "cmt_id": "902528183f4d94945a0c1ed6048d4a5d4e1e712e",
+ "fixed_version": "5.4.181"
+ }
+ },
"CVE-2022-22942": {
"4.14": {
"cmt_id": "e8d092a62449dcfc73517ca43963d2b8f44d0516",
@@ -30976,6 +31002,10 @@
}
},
"CVE-2022-23222": {
+ "5.15": {
+ "cmt_id": "8d38cde47a7e17b646401fa92d916503caa5375e",
+ "fixed_version": "5.15.37"
+ },
"5.16": {
"cmt_id": "77459bc4d5e2c6f24db845780b4d9d60cf82d06a",
"fixed_version": "5.16.11"