summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2022-07-02 17:46:23 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2022-07-02 17:46:23 +0200
commit7890eba82ad1d01bd513ee119a643d67189f46d5 (patch)
treeebeaeda89b5fe0e0a421207741259774da30370d
parentff933705f06916abef8774cb63fe0298b5ead5c3 (diff)
Update information for CVE-2022-32981
Add the (yet to be released) versions exceptionally, so I do not forget to merge. In fact the issue is unimportant for us as 32bit powerpc architecture is not a release architecture. So in context of kernel-sec we marked it earlier as ignored "no release architecture affected". On source-level the issue is addressed in 5.10.122, 4.19.247 and 4.9.318.
-rw-r--r--data/CVE/list2
-rw-r--r--data/next-point-update.txt2
2 files changed, 2 insertions, 2 deletions
diff --git a/data/CVE/list b/data/CVE/list
index 8bef785841..abeb30e4dc 100644
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -4933,6 +4933,8 @@ CVE-2022-32982
RESERVED
CVE-2022-32981 (An issue was discovered in the Linux kernel through 5.18.3 on powerpc ...)
- linux 5.18.5-1 (unimportant)
+ [bullseye] - linux 5.10.127-1
+ [buster] - linux 4.19.249-1
[stretch] - linux <ignored> (powerpc not supported in LTS)
NOTE: https://git.kernel.org/linus/8e1278444446fc97778a5e5c99bca1ce0bbc5ec9
NOTE: https://www.openwall.com/lists/oss-security/2022/06/14/3
diff --git a/data/next-point-update.txt b/data/next-point-update.txt
index 05b9f89da6..318de9dfb4 100644
--- a/data/next-point-update.txt
+++ b/data/next-point-update.txt
@@ -162,7 +162,5 @@ CVE-2022-21166
[bullseye] - linux 5.10.127-1
CVE-2022-32296
[bullseye] - linux 5.10.127-1
-CVE-2022-32981
- [bullseye] - linux 5.10.127-1
CVE-2022-1348
[bullseye] - logrotate 3.18.0-2+deb11u1

© 2014-2024 Faster IT GmbH | imprint | privacy policy