diff options
author | Thorsten Alteholz <debian@alteholz.de> | 2022-01-24 00:18:51 +0100 |
---|---|---|
committer | Thorsten Alteholz <debian@alteholz.de> | 2022-01-24 00:18:51 +0100 |
commit | 17f78241e13c2ecd37e826e7b548f5d005719bf2 (patch) | |
tree | 596806c4a82bd72b4e8c64d56f5a514aa667c80d /data/CVE/2022.list | |
parent | 560fc86aaba57fbc9fc6ccc2e8d0ca75d52c6ca8 (diff) |
mark CVE-2022-23303 as not-affected for Stretch
Diffstat (limited to 'data/CVE/2022.list')
-rw-r--r-- | data/CVE/2022.list | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/data/CVE/2022.list b/data/CVE/2022.list index 958f629c77..565b2fe161 100644 --- a/data/CVE/2022.list +++ b/data/CVE/2022.list @@ -1403,6 +1403,7 @@ CVE-2022-23304 (The implementations of EAP-pwd in hostapd before 2.10 and wpa_su NOTE: Issue exists because of an incomplete fix for CVE-2019-9495 CVE-2022-23303 (The implementations of SAE in hostapd before 2.10 and wpa_supplicant b ...) - wpa 2:2.10-1 + [stretch] - wpa <not-affected> (CVE-2019-9494 was not applied and is marked as ignored) NOTE: https://w1.fi/security/2022-1/ NOTE: Issue exists because of an incomplete fix for CVE-2019-9494 CVE-2022-0264 [bpf: Fix kernel address leakage in atomic fetch] |