diff options
author | Thorsten Alteholz <debian@alteholz.de> | 2022-01-24 00:05:57 +0100 |
---|---|---|
committer | Thorsten Alteholz <debian@alteholz.de> | 2022-01-24 00:05:57 +0100 |
commit | 426fd8bb706e59b2964b54b4497438655ea5c625 (patch) | |
tree | 8ab837e3ca986661c246cced45030bab076d7fea | |
parent | 5dc9d818ac8970523129fa641475f1541ddab18d (diff) |
mark CVE-2022-0204 as no-dsa for Stretch
-rw-r--r-- | data/CVE/list.2022 | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/data/CVE/list.2022 b/data/CVE/list.2022 index 192bbbf392..958f629c77 100644 --- a/data/CVE/list.2022 +++ b/data/CVE/list.2022 @@ -1786,6 +1786,7 @@ CVE-2022-0205 CVE-2022-0204 [Heap overflow vulnerability in the implementation of the gatt protocol] RESERVED - bluez <unfixed> (bug #1003712) + [stretch] - bluez <no-dsa> (Minor issue) NOTE: https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q NOTE: Fixed by: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=591c546c536b42bef696d027f64aa22434f8c3f0 (5.63) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2039807 |