[Git][security-tracker-team/security-tracker][master] 2 commits: data/CVE/list: Fix "release notes not ordered properly"

Ben Hutchings (@benh) gitlab at salsa.debian.org
Wed Dec 21 00:05:46 GMT 2022



Ben Hutchings pushed to branch master at Debian Security Tracker / security-tracker


Commits:
7b10624a by Ben Hutchings at 2022-12-21T01:03:11+01:00
data/CVE/list: Fix "release notes not ordered properly"

- - - - -
cd9da6f7 by Ben Hutchings at 2022-12-21T01:03:35+01:00
Reserve DLA-3245-1 for linux

- - - - -


2 changed files:

- data/CVE/list
- data/DLA/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -3123,8 +3123,8 @@ CVE-2022-4416 (A vulnerability was found in RainyGao DocSys. It has been declare
 CVE-2022-4415
 	RESERVED
 	- systemd <unfixed>
-	[buster] - systemd <not-affected> (Vulnerable code introduced later)
 	[bullseye] - systemd <no-dsa> (Minor issue; can be fixed via point release)
+	[buster] - systemd <not-affected> (Vulnerable code introduced later)
 	NOTE: Fixed by: https://github.com/systemd/systemd-stable/commit/bb47600aeb38c68c857fbf0ee5f66c3144dd81ce
 	NOTE: Affects only v247 and newer, and only if building with libacl support
 CVE-2022-4414 (Cross-site Scripting (XSS) - DOM in GitHub repository nuxt/framework p ...)
@@ -52851,7 +52851,6 @@ CVE-2022-1526 (A vulnerability, which was classified as problematic, was found i
 CVE-2022-29901 (Intel microprocessor generations 6 to 8 are affected by a new Spectre  ...)
 	{DSA-5207-1 DLA-3102-1}
 	- linux 5.18.14-1
-	[buster] - linux <ignored> (Mitigation is too invasive to backport)
 	NOTE: https://comsec.ethz.ch/research/microarch/retbleed/
 	NOTE: https://comsec.ethz.ch/wp-content/files/retbleed_sec22.pdf
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html


=====================================
data/DLA/list
=====================================
@@ -1,3 +1,6 @@
+[21 Dec 2022] DLA-3245-1 linux - security update
+	{CVE-2022-2978 CVE-2022-3521 CVE-2022-3524 CVE-2022-3535 CVE-2022-3542 CVE-2022-3564 CVE-2022-3565 CVE-2022-3594 CVE-2022-3621 CVE-2022-3628 CVE-2022-3640 CVE-2022-3643 CVE-2022-3646 CVE-2022-3649 CVE-2022-4378 CVE-2022-20369 CVE-2022-29901 CVE-2022-40768 CVE-2022-41849 CVE-2022-41850 CVE-2022-42328 CVE-2022-42329 CVE-2022-42895 CVE-2022-42896 CVE-2022-43750}
+	[buster] - linux 4.19.269-1
 [20 Dec 2022] DLA-3244-1 linux-5.10 - security update
 	{CVE-2021-3759 CVE-2022-3169 CVE-2022-3435 CVE-2022-3521 CVE-2022-3524 CVE-2022-3535 CVE-2022-3542 CVE-2022-3564 CVE-2022-3565 CVE-2022-3594 CVE-2022-3628 CVE-2022-3640 CVE-2022-3643 CVE-2022-4139 CVE-2022-4378 CVE-2022-41849 CVE-2022-41850 CVE-2022-42328 CVE-2022-42329 CVE-2022-42895 CVE-2022-42896 CVE-2022-47518 CVE-2022-47519 CVE-2022-47520 CVE-2022-47521}
 	[buster] - linux-5.10 5.10.158-2~deb10u1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/cbcf0ca5db58077f858e18977bddf7c17590dad8...cd9da6f72abaac6b96b60ac0984487a6bf1eb337

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/cbcf0ca5db58077f858e18977bddf7c17590dad8...cd9da6f72abaac6b96b60ac0984487a6bf1eb337
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221221/eaaa31dd/attachment.htm>


More information about the debian-security-tracker-commits mailing list