[Git][security-tracker-team/security-tracker][master] next-point-release; Review list of likely accepted packages

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Jun 18 12:52:01 BST 2021



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
c78370f9 by Salvatore Bonaccorso at 2021-06-18T13:50:59+02:00
next-point-release; Review list of likely accepted packages

Not all of those were either then uploaded, some need yet an ack from
SRM. Put the non-candidates below the list for easier merging on 10.10
point release time.

- - - - -


1 changed file:

- data/next-point-update.txt


Changes:

=====================================
data/next-point-update.txt
=====================================
@@ -1,33 +1,11 @@
-CVE-2019-20446
-	[buster] - librsvg 2.44.10-2.1+deb10u1
 CVE-2019-1020014
 	[buster] - golang-github-docker-docker-credential-helpers 0.6.1-2+deb10u1
-CVE-2019-17134
-	[buster] - octavia 3.0.0-3+deb10u1
-CVE-2019-14433
-	[buster] - nova 2:18.1.0-6+deb10u1
-CVE-2019-14857
-	[buster] - libapache2-mod-auth-openidc 2.3.10.2-1+deb10u1
 CVE-2020-29600
 	[buster] - awstats 7.6+dfsg-2+deb10u1
 CVE-2020-35176
 	[buster] - awstats 7.6+dfsg-2+deb10u1
 CVE-2020-5208
 	[buster] - ipmitool 1.8.18-6+deb10u1
-CVE-2020-8492
-	[buster] - python2.7 2.7.16-2+deb10u2
-CVE-2019-20907
-	[buster] - python2.7 2.7.16-2+deb10u2
-CVE-2021-3177
-	[buster] - python2.7 2.7.16-2+deb10u2
-CVE-2020-24583
-	[buster] - python-django 1:1.11.29-1~deb10u2
-CVE-2020-24584
-	[buster] - python-django 1:1.11.29-1~deb10u2
-CVE-2021-3281
-	[buster] - python-django 1:1.11.29-1~deb10u2
-CVE-2021-23336
-	[buster] - python-django 1:1.11.29-1~deb10u2
 CVE-2020-13124
 	[buster] - sabnzbdplus 2.3.6+dfsg-1+deb10u1
 CVE-2021-23362
@@ -46,8 +24,6 @@ CVE-2021-XXXX [first_boot: Use session to verify first boot welcome step]
 	[buster] - plinth 19.1+deb10u2
 CVE-2021-1405
 	[buster] - clamav 0.103.2+dfsg-0+deb10u1
-CVE-2020-4051
-	[buster] - dojo 1.14.2+dfsg1-1+deb10u3
 CVE-2019-20920
 	[buster] - node-handlebars 3:4.1.0-1+deb10u3
 CVE-2021-23369
@@ -56,16 +32,6 @@ CVE-2020-28469
 	[buster] - node-glob-parent 3.1.0-1+deb10u1
 CVE-2019-18849
 	[buster] - tnef 1.4.12-1.2+deb10u1
-CVE-2020-36277
-	[buster] - leptonlib 1.76.0-1+deb10u1
-CVE-2020-36278
-	[buster] - leptonlib 1.76.0-1+deb10u1
-CVE-2020-36279
-	[buster] - leptonlib 1.76.0-1+deb10u1
-CVE-2020-36280
-	[buster] - leptonlib 1.76.0-1+deb10u1
-CVE-2020-36281
-	[buster] - leptonlib 1.76.0-1+deb10u1
 CVE-2020-24616
 	[buster] - jackson-databind 2.9.8-3+deb10u3
 CVE-2020-24750
@@ -117,8 +83,6 @@ CVE-2020-15078
 	[buster] - openvpn 2.4.7-1+deb10u1
 CVE-2021-27229
 	[buster] - mumble 1.3.0~git20190125.440b173+dfsg-2+deb10u1
-CVE-2021-32062
-	[buster] - mapserver 7.2.2-1+deb10u1
 CVE-2020-13936
 	[buster] - velocity 1.7-5+deb10u1
  CVE-2020-7663
@@ -141,13 +105,7 @@ CVE-2021-33477
 CVE-2021-3561
 	[buster] - fig2dev 1:3.2.7a-5+deb10u4
 CVE-2021-26929
-	[[buster] - php-horde-text-filter 2.3.5-3+deb10u2
-CVE-2020-35572
-	[buster] - adminer 4.7.1-1+deb10u1
-CVE-2021-21311
-	[buster] - adminer 4.7.1-1+deb10u1
-CVE-2021-29625
-	[buster] - adminer 4.7.1-1+deb10u1
+	[buster] - php-horde-text-filter 2.3.5-3+deb10u2
 CVE-2021-32640
 	[buster] - node-ws 1.1.0+ds1.e6ddaae4-5+deb10u1
 CVE-2021-25217
@@ -166,8 +124,6 @@ CVE-2020-16600
 	[buster] - mupdf 1.14.0+ds1-4+deb10u3
 CVE-2021-3407
 	[buster] - mupdf 1.14.0+ds1-4+deb10u3
-CVE-2019-15605
-	[buster] - http-parser 2.8.1-1+deb10u1
 CVE-2021-20247
 	[buster] - isync 1.3.0-2.2~deb10u1
 CVE-2021-3578
@@ -188,8 +144,6 @@ CVE-2021-3541
 	[buster] - libxml2 2.9.4+dfsg1-7+deb10u2
 CVE-2021-33833
 	[buster] - connman 1.36-2.1~deb10u2
-CVE-2021-21375
-	[buster] - ring 20190215.1.f152c98~ds1-1+deb10u1
 CVE-2020-24586
 	[buster] - linux 4.19.194-1
 CVE-2020-24587
@@ -252,3 +206,49 @@ CVE-2021-3573
 	[buster] - linux 4.19.194-1
 CVE-2021-3587
 	[buster] - linux 4.19.194-1
+CVE-2019-20446
+	[buster] - librsvg 2.44.10-2.1+deb10u1
+CVE-2019-17134
+	[buster] - octavia 3.0.0-3+deb10u1
+CVE-2019-14433
+	[buster] - nova 2:18.1.0-6+deb10u1
+CVE-2019-14857
+	[buster] - libapache2-mod-auth-openidc 2.3.10.2-1+deb10u1
+CVE-2020-8492
+	[buster] - python2.7 2.7.16-2+deb10u2
+CVE-2019-20907
+	[buster] - python2.7 2.7.16-2+deb10u2
+CVE-2021-3177
+	[buster] - python2.7 2.7.16-2+deb10u2
+CVE-2020-24583
+	[buster] - python-django 1:1.11.29-1~deb10u2
+CVE-2020-24584
+	[buster] - python-django 1:1.11.29-1~deb10u2
+CVE-2021-3281
+	[buster] - python-django 1:1.11.29-1~deb10u2
+CVE-2021-23336
+	[buster] - python-django 1:1.11.29-1~deb10u2
+CVE-2020-4051
+	[buster] - dojo 1.14.2+dfsg1-1+deb10u3
+CVE-2020-36277
+	[buster] - leptonlib 1.76.0-1+deb10u1
+CVE-2020-36278
+	[buster] - leptonlib 1.76.0-1+deb10u1
+CVE-2020-36279
+	[buster] - leptonlib 1.76.0-1+deb10u1
+CVE-2020-36280
+	[buster] - leptonlib 1.76.0-1+deb10u1
+CVE-2020-36281
+	[buster] - leptonlib 1.76.0-1+deb10u1
+CVE-2021-32062
+	[buster] - mapserver 7.2.2-1+deb10u1
+CVE-2020-35572
+	[buster] - adminer 4.7.1-1+deb10u1
+CVE-2021-21311
+	[buster] - adminer 4.7.1-1+deb10u1
+CVE-2021-29625
+	[buster] - adminer 4.7.1-1+deb10u1
+CVE-2019-15605
+	[buster] - http-parser 2.8.1-1+deb10u1
+CVE-2021-21375
+	[buster] - ring 20190215.1.f152c98~ds1-1+deb10u1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c78370f92f2aa5a0c48d95988f5ba2459fb8645c

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c78370f92f2aa5a0c48d95988f5ba2459fb8645c
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210618/500abdb6/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list