diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2022-07-02 17:46:23 +0200 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2022-07-02 17:46:23 +0200 |
commit | 7890eba82ad1d01bd513ee119a643d67189f46d5 (patch) | |
tree | ebeaeda89b5fe0e0a421207741259774da30370d | |
parent | ff933705f06916abef8774cb63fe0298b5ead5c3 (diff) |
Update information for CVE-2022-32981
Add the (yet to be released) versions exceptionally, so I do not forget
to merge. In fact the issue is unimportant for us as 32bit powerpc
architecture is not a release architecture. So in context of kernel-sec
we marked it earlier as ignored "no release architecture affected". On
source-level the issue is addressed in 5.10.122, 4.19.247 and 4.9.318.
-rw-r--r-- | data/CVE/list | 2 | ||||
-rw-r--r-- | data/next-point-update.txt | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/data/CVE/list b/data/CVE/list index 8bef785841..abeb30e4dc 100644 --- a/data/CVE/list +++ b/data/CVE/list @@ -4933,6 +4933,8 @@ CVE-2022-32982 RESERVED CVE-2022-32981 (An issue was discovered in the Linux kernel through 5.18.3 on powerpc ...) - linux 5.18.5-1 (unimportant) + [bullseye] - linux 5.10.127-1 + [buster] - linux 4.19.249-1 [stretch] - linux <ignored> (powerpc not supported in LTS) NOTE: https://git.kernel.org/linus/8e1278444446fc97778a5e5c99bca1ce0bbc5ec9 NOTE: https://www.openwall.com/lists/oss-security/2022/06/14/3 diff --git a/data/next-point-update.txt b/data/next-point-update.txt index 05b9f89da6..318de9dfb4 100644 --- a/data/next-point-update.txt +++ b/data/next-point-update.txt @@ -162,7 +162,5 @@ CVE-2022-21166 [bullseye] - linux 5.10.127-1 CVE-2022-32296 [bullseye] - linux 5.10.127-1 -CVE-2022-32981 - [bullseye] - linux 5.10.127-1 CVE-2022-1348 [bullseye] - logrotate 3.18.0-2+deb11u1 |