[Git][security-tracker-team/security-tracker][master] next-point-release; Review list of likely accepted packages
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Fri Jun 18 12:52:01 BST 2021
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
c78370f9 by Salvatore Bonaccorso at 2021-06-18T13:50:59+02:00
next-point-release; Review list of likely accepted packages
Not all of those were either then uploaded, some need yet an ack from
SRM. Put the non-candidates below the list for easier merging on 10.10
point release time.
- - - - -
1 changed file:
- data/next-point-update.txt
Changes:
=====================================
data/next-point-update.txt
=====================================
@@ -1,33 +1,11 @@
-CVE-2019-20446
- [buster] - librsvg 2.44.10-2.1+deb10u1
CVE-2019-1020014
[buster] - golang-github-docker-docker-credential-helpers 0.6.1-2+deb10u1
-CVE-2019-17134
- [buster] - octavia 3.0.0-3+deb10u1
-CVE-2019-14433
- [buster] - nova 2:18.1.0-6+deb10u1
-CVE-2019-14857
- [buster] - libapache2-mod-auth-openidc 2.3.10.2-1+deb10u1
CVE-2020-29600
[buster] - awstats 7.6+dfsg-2+deb10u1
CVE-2020-35176
[buster] - awstats 7.6+dfsg-2+deb10u1
CVE-2020-5208
[buster] - ipmitool 1.8.18-6+deb10u1
-CVE-2020-8492
- [buster] - python2.7 2.7.16-2+deb10u2
-CVE-2019-20907
- [buster] - python2.7 2.7.16-2+deb10u2
-CVE-2021-3177
- [buster] - python2.7 2.7.16-2+deb10u2
-CVE-2020-24583
- [buster] - python-django 1:1.11.29-1~deb10u2
-CVE-2020-24584
- [buster] - python-django 1:1.11.29-1~deb10u2
-CVE-2021-3281
- [buster] - python-django 1:1.11.29-1~deb10u2
-CVE-2021-23336
- [buster] - python-django 1:1.11.29-1~deb10u2
CVE-2020-13124
[buster] - sabnzbdplus 2.3.6+dfsg-1+deb10u1
CVE-2021-23362
@@ -46,8 +24,6 @@ CVE-2021-XXXX [first_boot: Use session to verify first boot welcome step]
[buster] - plinth 19.1+deb10u2
CVE-2021-1405
[buster] - clamav 0.103.2+dfsg-0+deb10u1
-CVE-2020-4051
- [buster] - dojo 1.14.2+dfsg1-1+deb10u3
CVE-2019-20920
[buster] - node-handlebars 3:4.1.0-1+deb10u3
CVE-2021-23369
@@ -56,16 +32,6 @@ CVE-2020-28469
[buster] - node-glob-parent 3.1.0-1+deb10u1
CVE-2019-18849
[buster] - tnef 1.4.12-1.2+deb10u1
-CVE-2020-36277
- [buster] - leptonlib 1.76.0-1+deb10u1
-CVE-2020-36278
- [buster] - leptonlib 1.76.0-1+deb10u1
-CVE-2020-36279
- [buster] - leptonlib 1.76.0-1+deb10u1
-CVE-2020-36280
- [buster] - leptonlib 1.76.0-1+deb10u1
-CVE-2020-36281
- [buster] - leptonlib 1.76.0-1+deb10u1
CVE-2020-24616
[buster] - jackson-databind 2.9.8-3+deb10u3
CVE-2020-24750
@@ -117,8 +83,6 @@ CVE-2020-15078
[buster] - openvpn 2.4.7-1+deb10u1
CVE-2021-27229
[buster] - mumble 1.3.0~git20190125.440b173+dfsg-2+deb10u1
-CVE-2021-32062
- [buster] - mapserver 7.2.2-1+deb10u1
CVE-2020-13936
[buster] - velocity 1.7-5+deb10u1
CVE-2020-7663
@@ -141,13 +105,7 @@ CVE-2021-33477
CVE-2021-3561
[buster] - fig2dev 1:3.2.7a-5+deb10u4
CVE-2021-26929
- [[buster] - php-horde-text-filter 2.3.5-3+deb10u2
-CVE-2020-35572
- [buster] - adminer 4.7.1-1+deb10u1
-CVE-2021-21311
- [buster] - adminer 4.7.1-1+deb10u1
-CVE-2021-29625
- [buster] - adminer 4.7.1-1+deb10u1
+ [buster] - php-horde-text-filter 2.3.5-3+deb10u2
CVE-2021-32640
[buster] - node-ws 1.1.0+ds1.e6ddaae4-5+deb10u1
CVE-2021-25217
@@ -166,8 +124,6 @@ CVE-2020-16600
[buster] - mupdf 1.14.0+ds1-4+deb10u3
CVE-2021-3407
[buster] - mupdf 1.14.0+ds1-4+deb10u3
-CVE-2019-15605
- [buster] - http-parser 2.8.1-1+deb10u1
CVE-2021-20247
[buster] - isync 1.3.0-2.2~deb10u1
CVE-2021-3578
@@ -188,8 +144,6 @@ CVE-2021-3541
[buster] - libxml2 2.9.4+dfsg1-7+deb10u2
CVE-2021-33833
[buster] - connman 1.36-2.1~deb10u2
-CVE-2021-21375
- [buster] - ring 20190215.1.f152c98~ds1-1+deb10u1
CVE-2020-24586
[buster] - linux 4.19.194-1
CVE-2020-24587
@@ -252,3 +206,49 @@ CVE-2021-3573
[buster] - linux 4.19.194-1
CVE-2021-3587
[buster] - linux 4.19.194-1
+CVE-2019-20446
+ [buster] - librsvg 2.44.10-2.1+deb10u1
+CVE-2019-17134
+ [buster] - octavia 3.0.0-3+deb10u1
+CVE-2019-14433
+ [buster] - nova 2:18.1.0-6+deb10u1
+CVE-2019-14857
+ [buster] - libapache2-mod-auth-openidc 2.3.10.2-1+deb10u1
+CVE-2020-8492
+ [buster] - python2.7 2.7.16-2+deb10u2
+CVE-2019-20907
+ [buster] - python2.7 2.7.16-2+deb10u2
+CVE-2021-3177
+ [buster] - python2.7 2.7.16-2+deb10u2
+CVE-2020-24583
+ [buster] - python-django 1:1.11.29-1~deb10u2
+CVE-2020-24584
+ [buster] - python-django 1:1.11.29-1~deb10u2
+CVE-2021-3281
+ [buster] - python-django 1:1.11.29-1~deb10u2
+CVE-2021-23336
+ [buster] - python-django 1:1.11.29-1~deb10u2
+CVE-2020-4051
+ [buster] - dojo 1.14.2+dfsg1-1+deb10u3
+CVE-2020-36277
+ [buster] - leptonlib 1.76.0-1+deb10u1
+CVE-2020-36278
+ [buster] - leptonlib 1.76.0-1+deb10u1
+CVE-2020-36279
+ [buster] - leptonlib 1.76.0-1+deb10u1
+CVE-2020-36280
+ [buster] - leptonlib 1.76.0-1+deb10u1
+CVE-2020-36281
+ [buster] - leptonlib 1.76.0-1+deb10u1
+CVE-2021-32062
+ [buster] - mapserver 7.2.2-1+deb10u1
+CVE-2020-35572
+ [buster] - adminer 4.7.1-1+deb10u1
+CVE-2021-21311
+ [buster] - adminer 4.7.1-1+deb10u1
+CVE-2021-29625
+ [buster] - adminer 4.7.1-1+deb10u1
+CVE-2019-15605
+ [buster] - http-parser 2.8.1-1+deb10u1
+CVE-2021-21375
+ [buster] - ring 20190215.1.f152c98~ds1-1+deb10u1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c78370f92f2aa5a0c48d95988f5ba2459fb8645c
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c78370f92f2aa5a0c48d95988f5ba2459fb8645c
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210618/500abdb6/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list