summaryrefslogtreecommitdiffstats
path: root/data/CVE/2015.list
diff options
context:
space:
mode:
authorThorsten Alteholz <debian@alteholz.de>2021-02-19 15:46:56 +0100
committerThorsten Alteholz <debian@alteholz.de>2021-02-19 23:01:17 +0100
commit74b3746b4fde6aa1166801e45bcec6e3ccad5e3c (patch)
tree8bab2b7436edd81e0f53c2c6d8195c46ca4a069a /data/CVE/2015.list
parent956d32af48f8b58e6cbd25ecb9d900849d9cf4fd (diff)
uploading new point release in Stretch fixes some CVEs
Diffstat (limited to 'data/CVE/2015.list')
-rw-r--r--data/CVE/2015.list1
1 files changed, 0 insertions, 1 deletions
diff --git a/data/CVE/2015.list b/data/CVE/2015.list
index 1f34699185..d743ecdd9a 100644
--- a/data/CVE/2015.list
+++ b/data/CVE/2015.list
@@ -5433,7 +5433,6 @@ CVE-2015-8011 (Buffer overflow in the lldp_decode function in daemon/protocols/l
[wheezy] - lldpd <not-affected> (Vulnerable code not present)
[squeeze] - lldpd <not-affected> (Vulnerable code not present)
- openvswitch 2.15.0~git20210104.def6eb1ea+dfsg1-1
- [stretch] - openvswitch <no-dsa> (Minor issue)
NOTE: https://github.com/lldpd/lldpd/commit/dd4f16e7e816f2165fba76e3d162cd8d2978dcb2
NOTE: https://www.openwall.com/lists/oss-security/2015/10/16/2
NOTE: https://mail.openvswitch.org/pipermail/ovs-announce/2021-January/000268.html

© 2014-2024 Faster IT GmbH | imprint | privacy policy