diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2022-07-04 10:36:50 +0200 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2022-07-04 10:36:50 +0200 |
commit | bbbebfb9d7af4f12b4db87cc928e0b38a8e803cd (patch) | |
tree | c86e1e8c69b42b5a32e86d13ab8f38fac6319f9d /retired/CVE-2022-32296 | |
parent | 4b45d2997b2bb2116c15c422ada362526c26c264 (diff) |
retire multiple issues
Diffstat (limited to 'retired/CVE-2022-32296')
-rw-r--r-- | retired/CVE-2022-32296 | 13 |
1 files changed, 13 insertions, 0 deletions
diff --git a/retired/CVE-2022-32296 b/retired/CVE-2022-32296 new file mode 100644 index 00000000..c2772817 --- /dev/null +++ b/retired/CVE-2022-32296 @@ -0,0 +1,13 @@ +Description: tcp: increase source port perturb table to 2^16 +References: +Notes: + bwh> This seems to be a duplicate of CVE-2022-1012. +Bugs: +upstream: released (5.18-rc6) [4c2c8f03a5ab7cb04ec64724d7d176d00bcc91e5] +5.10-upstream-stable: released (5.10.125) [9429b75bc271b6f29e50dbb0ee0751800ff87dd9] +4.19-upstream-stable: released (4.19.249) [514cd2859c5017fdc487165b093b328e24afe954] +4.9-upstream-stable: released (4.9.320) [3c78eea640f69e2198b69128173e6d65a0bcdc02] +sid: released (5.17.11-1) +5.10-bullseye-security: needed +4.19-buster-security: released (4.19.249-1) +4.9-stretch-security: released (4.9.320-2) |