summaryrefslogtreecommitdiffstats
path: root/ignored
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2023-10-05 15:58:02 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2023-10-05 15:58:02 +0200
commit81bc3795e6115ee7fa4144ad5bf0b4a2b7b2d08d (patch)
tree87ce594e9a84b45447bee2f14ddd3dfc5bdf024b /ignored
parentb725e94ccbfa6f510b1d092e825b0be8949f7ec4 (diff)
Fill in stable version information
Diffstat (limited to 'ignored')
-rw-r--r--ignored/CVE-2022-4588616
-rw-r--r--ignored/CVE-2022-4588716
-rw-r--r--ignored/CVE-2022-4591916
3 files changed, 24 insertions, 24 deletions
diff --git a/ignored/CVE-2022-45886 b/ignored/CVE-2022-45886
index 073cfc86..71bbee98 100644
--- a/ignored/CVE-2022-45886
+++ b/ignored/CVE-2022-45886
@@ -6,11 +6,11 @@ Notes:
carnil> Negligible security impact, would need physical access to
carnil> "exploit"
Bugs:
-upstream: released (6.4~rc3) [4172385b0c9ac366dcab78eda48c26814b87ed1a]
-6.1-upstream-stable: released (6.4.4-1)
-5.10-upstream-stable: ignored "non issue, if anyone has physical access to trigger this they can do more harm anyway"
-4.19-upstream-stable: ignored "non issue, if anyone has physical access to trigger this they can do more harm anyway"
-sid: ignored "non issue, if anyone has physical access to trigger this they can do more harm anyway"
-6.1-bookworm-security: ignored "non issue, if anyone has physical access to trigger this they can do more harm anyway"
-5.10-bullseye-security: ignored "non issue, if anyone has physical access to trigger this they can do more harm anyway"
-4.19-buster-security: ignored "non issue, if anyone has physical access to trigger this they can do more harm anyway"
+upstream: released (6.4-rc3) [4172385b0c9ac366dcab78eda48c26814b87ed1a]
+6.1-upstream-stable: released (6.1.33) [93b5dfebcb1821dde466e29404fcf1fb919f4c72]
+5.10-upstream-stable: released (5.10.183) [2ea7d26ed851db7176e4bfa8174c8a1380255bbe]
+4.19-upstream-stable: released (4.19.285) [7bb9c6e05efcecb15b0354d574efbc36ca321d75]
+sid: released (6.3.7-1)
+6.1-bookworm-security: released (6.1.37-1)
+5.10-bullseye-security: released (5.10.191-1)
+4.19-buster-security: released (4.19.289-1)
diff --git a/ignored/CVE-2022-45887 b/ignored/CVE-2022-45887
index c044159e..a6124c95 100644
--- a/ignored/CVE-2022-45887
+++ b/ignored/CVE-2022-45887
@@ -6,11 +6,11 @@ Notes:
carnil> Negligible security impact, would need physical access to
carnil> "exploit"
Bugs:
-upstream: released (6.4~rc3) [280a8ab81733da8bc442253c700a52c4c0886ffd]
-6.1-upstream-stable: released (6.4.4-1)
-5.10-upstream-stable: ignored "non issue, if anyone has physical access to trigger this they can do more harm anyway"
-4.19-upstream-stable: ignored "non issue, if anyone has physical access to trigger this they can do more harm anyway"
-sid: ignored "non issue, if anyone has physical access to trigger this they can do more harm anyway"
-6.1-bookworm-security: ignored "non issue, if anyone has physical access to trigger this they can do more harm anyway"
-5.10-bullseye-security: ignored "non issue, if anyone has physical access to trigger this they can do more harm anyway"
-4.19-buster-security: ignored "non issue, if anyone has physical access to trigger this they can do more harm anyway"
+upstream: released (6.4-rc3) [517a281338322ff8293f988771c98aaa7205e457]
+6.1-upstream-stable: released (6.1.33) [ea2938c27b0212aaab6702c16b7385e073b35643]
+5.10-upstream-stable: released (5.10.183) [eb37fef417a246fe54530901a3ea9c0abc914fc2]
+4.19-upstream-stable: released (4.19.285) [3e5af0745a4702ab0df2f880bfe0431eb30f9164]
+sid: released (6.3.7-1)
+6.1-bookworm-security: released (6.1.37-1)
+5.10-bullseye-security: released (5.10.191-1)
+4.19-buster-security: released (4.19.289-1)
diff --git a/ignored/CVE-2022-45919 b/ignored/CVE-2022-45919
index f0d9cb8e..cfebed39 100644
--- a/ignored/CVE-2022-45919
+++ b/ignored/CVE-2022-45919
@@ -5,11 +5,11 @@ Notes:
carnil> Negligible security impact, would need physical access to
carnil> "exploit"
Bugs:
-upstream: released (6.4~rc3) [84172385b0c9ac366dcab78eda48c26814b87ed1a]
-6.1-upstream-stable: released (6.4.4-1)
-5.10-upstream-stable: ignored "non issue, if anyone has physical access to trigger this they can do more harm anyway"
-4.19-upstream-stable: ignored "non issue, if anyone has physical access to trigger this they can do more harm anyway"
-sid: ignored "non issue, if anyone has physical access to trigger this they can do more harm anyway"
-6.1-bookworm-security: ignored "non issue, if anyone has physical access to trigger this they can do more harm anyway"
-5.10-bullseye-security: ignored "non issue, if anyone has physical access to trigger this they can do more harm anyway"
-4.19-buster-security: ignored "non issue, if anyone has physical access to trigger this they can do more harm anyway"
+upstream: released (6.4-rc3) [280a8ab81733da8bc442253c700a52c4c0886ffd]
+6.1-upstream-stable: released (6.1.33) [d5d61f747e3f1ff9042db66896f2f90afa5f3197]
+5.10-upstream-stable: released (5.10.183) [76169f7490899d74aad4b0e2c4c1b9d4904dd01f]
+4.19-upstream-stable: released (4.19.285) [8624c7e048fa9ba584b7ba43715090ab1aed765c]
+sid: released (6.3.7-1)
+6.1-bookworm-security: released (6.1.37-1)
+5.10-bullseye-security: released (5.10.191-1)
+4.19-buster-security: released (4.19.289-1)

© 2014-2024 Faster IT GmbH | imprint | privacy policy