Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
7152190a by Salvatore Bonaccorso at 2022-11-26T16:12:58+01:00
Track fixed version for two linux CVEs via unstable upload

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -10785,7 +10785,7 @@ CVE-2022-3522 (A vulnerability was found in Linux 
Kernel and classified as probl
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/f9bf6c03eca1077cae8de0e6d86427656fa42a9b
 CVE-2022-3521 (A vulnerability has been found in Linux Kernel and classified 
as probl ...)
-       - linux <unfixed> (unimportant)
+       - linux 6.0.10-1 (unimportant)
        NOTE: 
https://git.kernel.org/linus/ec7eede369fe5b0d085ac51fdbb95184f87bfc6c
        NOTE: In Debian CONFIG_AF_KCM is not set
 CVE-2022-42969 (The py library through 1.11.0 for Python allows remote 
attackers to co ...)
@@ -17648,7 +17648,7 @@ CVE-2022-40239
 CVE-2022-40238 (A Remote Code Injection vulnerability exists in CERT software 
prior to ...)
        NOT-FOR-US: CERT software
 CVE-2022-3169 (A flaw was found in the Linux kernel. A denial of service flaw 
may occ ...)
-       - linux <unfixed>
+       - linux 6.0.10-1
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2125341
        NOTE: https://bugzilla.kernel.org/show_bug.cgi?id=214771
 CVE-2022-3168



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7152190a1d8feb2e86e5dee0356065739870b40f

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7152190a1d8feb2e86e5dee0356065739870b40f
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to