summaryrefslogtreecommitdiffstats
path: root/data/CVE/list.2015
diff options
context:
space:
mode:
authorThorsten Alteholz <debian@alteholz.de>2021-02-19 15:46:56 +0100
committerThorsten Alteholz <debian@alteholz.de>2021-02-19 23:01:17 +0100
commit1db454fdbadcdf9c00b89b97d81d13321018d690 (patch)
tree0bc32b204a47afec7895256dfec8f332c2942509 /data/CVE/list.2015
parent0fbc72a6d701233c3b7d2a7a60b465ae20c58c69 (diff)
uploading new point release in Stretch fixes some CVEs
Diffstat (limited to 'data/CVE/list.2015')
-rw-r--r--data/CVE/list.20151
1 files changed, 0 insertions, 1 deletions
diff --git a/data/CVE/list.2015 b/data/CVE/list.2015
index 1f34699185..d743ecdd9a 100644
--- a/data/CVE/list.2015
+++ b/data/CVE/list.2015
@@ -5433,7 +5433,6 @@ CVE-2015-8011 (Buffer overflow in the lldp_decode function in daemon/protocols/l
[wheezy] - lldpd <not-affected> (Vulnerable code not present)
[squeeze] - lldpd <not-affected> (Vulnerable code not present)
- openvswitch 2.15.0~git20210104.def6eb1ea+dfsg1-1
- [stretch] - openvswitch <no-dsa> (Minor issue)
NOTE: https://github.com/lldpd/lldpd/commit/dd4f16e7e816f2165fba76e3d162cd8d2978dcb2
NOTE: https://www.openwall.com/lists/oss-security/2015/10/16/2
NOTE: https://mail.openvswitch.org/pipermail/ovs-announce/2021-January/000268.html

© 2014-2024 Faster IT GmbH | imprint | privacy policy