[Git][security-tracker-team/security-tracker][master] Sync version information with kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Oct 5 15:01:50 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
9ed7d695 by Salvatore Bonaccorso at 2023-10-05T16:01:15+02:00
Sync version information with kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -55679,7 +55679,10 @@ CVE-2022-45921 (FusionAuth before 1.41.3 allows a file outside of the applicatio
 CVE-2022-45920 (In Softing uaToolkit Embedded before 1.41, a malformed CreateMonitored ...)
 	NOT-FOR-US: Softing uaToolkit Embedded
 CVE-2022-45919 (An issue was discovered in the Linux kernel through 6.0.10. In drivers ...)
-	- linux 6.4.4-1 (unimportant)
+	- linux 6.3.7-1 (unimportant)
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	[buster] - linux 4.19.289-1
 	NOTE: https://lore.kernel.org/linux-media/20221121063308.GA33821%40ubuntu/T/#u
 	NOTE: Negligible security impact, would need physical access to "exploit"
 	NOTE: https://git.kernel.org/linus/280a8ab81733da8bc442253c700a52c4c0886ffd
@@ -55786,14 +55789,18 @@ CVE-2022-45888 (An issue was discovered in the Linux kernel through 6.0.9. drive
 	NOTE: https://lore.kernel.org/all/20221022175404.GA375335@ubuntu/
 	NOTE: Negligible security impact, would need physical access to "exploit"
 CVE-2022-45887 (An issue was discovered in the Linux kernel through 6.0.9. drivers/med ...)
-	- linux 6.4.4-1 (unimportant)
-	[bookworm] - linux <postponed> (Minor issue, revisit when fixed upstream)
-	[bullseye] - linux <postponed> (Minor issue, revisit when fixed upstream)
+	- linux 6.3.7-1 (unimportant)
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	[buster] - linux 4.19.289-1
 	NOTE: https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel@gmail.com/
 	NOTE: Negligible security impact, would need physical access to "exploit"
 	NOTE: https://git.kernel.org/linus/517a281338322ff8293f988771c98aaa7205e457
 CVE-2022-45886 (An issue was discovered in the Linux kernel through 6.0.9. drivers/med ...)
-	- linux 6.4.4-1 (unimportant)
+	- linux 6.3.7-1 (unimportant)
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	[buster] - linux 4.19.289-1
 	NOTE: https://lore.kernel.org/linux-media/20221115131822.6640-3-imv4bel@gmail.com/
 	NOTE: Negligible security impact, would need physical access to "exploit"
 	NOTE: https://git.kernel.org/linus/4172385b0c9ac366dcab78eda48c26814b87ed1a



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9ed7d6957f6b55ef2f5ba74e65a7e044b0dc833f

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9ed7d6957f6b55ef2f5ba74e65a7e044b0dc833f
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231005/fdf0f5b2/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list