diff options
author | Thorsten Alteholz <debian@alteholz.de> | 2022-01-24 00:18:51 +0100 |
---|---|---|
committer | Thorsten Alteholz <debian@alteholz.de> | 2022-01-24 00:18:51 +0100 |
commit | 66068197239691c80e1453872cd4b0fead5c080f (patch) | |
tree | af6a27aa74751c7c29932f0a26cca4c1b26393b4 | |
parent | a080a00b73ce11b5f58088f6f01c4d5ef9480ff1 (diff) |
mark CVE-2022-23303 as not-affected for Stretch
-rw-r--r-- | data/CVE/list.2022 | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/data/CVE/list.2022 b/data/CVE/list.2022 index 958f629c77..565b2fe161 100644 --- a/data/CVE/list.2022 +++ b/data/CVE/list.2022 @@ -1403,6 +1403,7 @@ CVE-2022-23304 (The implementations of EAP-pwd in hostapd before 2.10 and wpa_su NOTE: Issue exists because of an incomplete fix for CVE-2019-9495 CVE-2022-23303 (The implementations of SAE in hostapd before 2.10 and wpa_supplicant b ...) - wpa 2:2.10-1 + [stretch] - wpa <not-affected> (CVE-2019-9494 was not applied and is marked as ignored) NOTE: https://w1.fi/security/2022-1/ NOTE: Issue exists because of an incomplete fix for CVE-2019-9494 CVE-2022-0264 [bpf: Fix kernel address leakage in atomic fetch] |