diff options
author | Thorsten Alteholz <debian@alteholz.de> | 2022-01-24 00:05:57 +0100 |
---|---|---|
committer | Thorsten Alteholz <debian@alteholz.de> | 2022-01-24 00:05:57 +0100 |
commit | dce78c8f7d0a38150eb2cef0894e5c2c445f0c07 (patch) | |
tree | 7b14ba60ee08eef7a9c8a448166d6df2ba0e661b /data/CVE/2022.list | |
parent | e707dc67a6d6ab6f00de31a1c5017f75eb158c82 (diff) |
mark CVE-2022-0204 as no-dsa for Stretch
Diffstat (limited to 'data/CVE/2022.list')
-rw-r--r-- | data/CVE/2022.list | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/data/CVE/2022.list b/data/CVE/2022.list index 192bbbf392..958f629c77 100644 --- a/data/CVE/2022.list +++ b/data/CVE/2022.list @@ -1786,6 +1786,7 @@ CVE-2022-0205 CVE-2022-0204 [Heap overflow vulnerability in the implementation of the gatt protocol] RESERVED - bluez <unfixed> (bug #1003712) + [stretch] - bluez <no-dsa> (Minor issue) NOTE: https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q NOTE: Fixed by: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=591c546c536b42bef696d027f64aa22434f8c3f0 (5.63) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2039807 |