Your message dated Thu, 27 Nov 2025 09:26:05 +0100
with message-id <[email protected]>
and subject line Done
has caused the Debian Bug report #1027150,
regarding neutron: CVE-2022-3277
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1027150: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027150
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: neutron
X-Debbugs-CC: [email protected]
Severity: important
Tags: security

Hi,

The following vulnerability was published for neutron.

For CVE-2022-3277 the original reference is from Red Hat Bugzilla,
not sure if it was been reported upstream:

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-3277

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-3277
    https://www.cve.org/CVERecord?id=CVE-2022-3277

Please adjust the affected versions in the BTS as needed.

--- End Message ---
--- Begin Message ---
I can confirm that Bullseye is still vulnerable to CVE-2022-3277, however:
1/ All version above (Bookworm, Trixie, Forky, Sid) have been fixed
2/ The patched version is available under osbpo.debian.net

Anyone willing to fix official Bullseye can take the version from the branch debian/victoria in Git.

It's anyway a relatively minor issue.

I'm therefore closing this bug.

Cheers,

Thomas Goirand (zigo)

--- End Message ---

Reply via email to