summaryrefslogtreecommitdiffstats
path: root/data/CVE/list.2022
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2022-01-17 19:38:54 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2022-01-17 19:38:54 +0100
commitfaf0cfb5cd426a66a33e1fb854983606df5e80fd (patch)
tree92cf250fc2136d44968c55e53ecfa2814e83dde8 /data/CVE/list.2022
parent63d46282f2db4f87053c82c30005a17fb460c78b (diff)
Add CVE-2022-0264/linux
Diffstat (limited to 'data/CVE/list.2022')
-rw-r--r--data/CVE/list.20226
1 files changed, 6 insertions, 0 deletions
diff --git a/data/CVE/list.2022 b/data/CVE/list.2022
index 643895a736..156e8ff615 100644
--- a/data/CVE/list.2022
+++ b/data/CVE/list.2022
@@ -6,6 +6,12 @@ CVE-2022-23303 (The implementations of SAE in hostapd before 2.10 and wpa_suppli
- wpa <unfixed>
NOTE: https://w1.fi/security/2022-1/
NOTE: Issue exists because of an incomplete fix for CVE-2019-9494
+CVE-2022-0264 [bpf: Fix kernel address leakage in atomic fetch]
+ - linux 5.15.5-2
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ [stretch] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/7d3baf0afa3aa9102d6a521a8e4c41888bb79882 (5.16-rc6)
CVE-2022-0245
RESERVED
CVE-2022-0244

© 2014-2024 Faster IT GmbH | imprint | privacy policy