<div dir="ltr"><div>Hi,</div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">Le ven. 30 juin 2023 à 19:21, Salvatore Bonaccorso <<a href="mailto:carnil@debian.org">carnil@debian.org</a>> a écrit :<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Source: nodejs<br>
Version: 18.13.0+dfsg1-1<br>
Severity: important<br>
Tags: security upstream<br>
X-Debbugs-Cc: <a href="mailto:carnil@debian.org" target="_blank">carnil@debian.org</a>, Debian Security Team <<a href="mailto:team@security.debian.org" target="_blank">team@security.debian.org</a>><br>
<br>
Hi,<br>
<br>
The following vulnerabilities were published for nodejs.<br>
<br>
CVE-2023-30581[0], CVE-2023-30588[1], CVE-2023-30589[2] and<br>
CVE-2023-30590[3].<br>
<br>
<br>
If you fix the vulnerabilities please also make sure to include the<br>
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.<br></blockquote><div><br></div><div>It would be interesting to know if we adopt the same plan we had with security team:</div><div>full upstream updates in the same branch, 18.x here.</div><div><br></div><div>Jérémy</div></div></div>