summaryrefslogtreecommitdiffstats
path: root/data/CVE/list.2022
diff options
context:
space:
mode:
authorThorsten Alteholz <debian@alteholz.de>2022-01-24 00:18:51 +0100
committerThorsten Alteholz <debian@alteholz.de>2022-01-24 00:18:51 +0100
commit66068197239691c80e1453872cd4b0fead5c080f (patch)
treeaf6a27aa74751c7c29932f0a26cca4c1b26393b4 /data/CVE/list.2022
parenta080a00b73ce11b5f58088f6f01c4d5ef9480ff1 (diff)
mark CVE-2022-23303 as not-affected for Stretch
Diffstat (limited to 'data/CVE/list.2022')
-rw-r--r--data/CVE/list.20221
1 files changed, 1 insertions, 0 deletions
diff --git a/data/CVE/list.2022 b/data/CVE/list.2022
index 958f629c77..565b2fe161 100644
--- a/data/CVE/list.2022
+++ b/data/CVE/list.2022
@@ -1403,6 +1403,7 @@ CVE-2022-23304 (The implementations of EAP-pwd in hostapd before 2.10 and wpa_su
NOTE: Issue exists because of an incomplete fix for CVE-2019-9495
CVE-2022-23303 (The implementations of SAE in hostapd before 2.10 and wpa_supplicant b ...)
- wpa 2:2.10-1
+ [stretch] - wpa <not-affected> (CVE-2019-9494 was not applied and is marked as ignored)
NOTE: https://w1.fi/security/2022-1/
NOTE: Issue exists because of an incomplete fix for CVE-2019-9494
CVE-2022-0264 [bpf: Fix kernel address leakage in atomic fetch]

© 2014-2024 Faster IT GmbH | imprint | privacy policy