[Git][security-tracker-team/security-tracker][master] Review list of accepted buster-pu updates for point release
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Fri Mar 25 20:08:07 GMT 2022
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
62cd59b9 by Salvatore Bonaccorso at 2022-03-25T21:07:22+01:00
Review list of accepted buster-pu updates for point release
Keep the one accepted on top and move the yet to be reviewed, acked or
uploaded to the end.
- - - - -
1 changed file:
- data/next-oldstable-point-update.txt
Changes:
=====================================
data/next-oldstable-point-update.txt
=====================================
@@ -6,30 +6,6 @@ CVE-2021-3778
[buster] - vim 2:8.1.0875-5+deb10u1
CVE-2021-3796
[buster] - vim 2:8.1.0875-5+deb10u1
-CVE-2019-20446
- [buster] - librsvg 2.44.10-2.1+deb10u1
-CVE-2019-17134
- [buster] - octavia 3.0.0-3+deb10u1
-CVE-2019-14433
- [buster] - nova 2:18.1.0-6+deb10u1
-CVE-2019-14857
- [buster] - libapache2-mod-auth-openidc 2.3.10.2-1+deb10u1
-CVE-2020-8492
- [buster] - python2.7 2.7.16-2+deb10u2
-CVE-2019-20907
- [buster] - python2.7 2.7.16-2+deb10u2
-CVE-2021-3177
- [buster] - python2.7 2.7.16-2+deb10u2
-CVE-2020-24583
- [buster] - python-django 1:1.11.29-1~deb10u2
-CVE-2020-24584
- [buster] - python-django 1:1.11.29-1~deb10u2
-CVE-2021-3281
- [buster] - python-django 1:1.11.29-1~deb10u2
-CVE-2021-23336
- [buster] - python-django 1:1.11.29-1~deb10u2
-CVE-2020-4051
- [buster] - dojo 1.14.2+dfsg1-1+deb10u3
CVE-2020-36277
[buster] - leptonlib 1.76.0-1+deb10u1
CVE-2020-36278
@@ -40,16 +16,6 @@ CVE-2020-36280
[buster] - leptonlib 1.76.0-1+deb10u1
CVE-2020-36281
[buster] - leptonlib 1.76.0-1+deb10u1
-CVE-2021-32062
- [buster] - mapserver 7.2.2-1+deb10u1
-CVE-2020-35572
- [buster] - adminer 4.7.1-1+deb10u1
-CVE-2021-21311
- [buster] - adminer 4.7.1-1+deb10u1
-CVE-2021-29625
- [buster] - adminer 4.7.1-1+deb10u1
-CVE-2021-35525
- [buster] - postsrsd 1.5-2+deb10u2
CVE-2020-35653
[buster] - pillow 5.4.1-2+deb10u3
CVE-2020-35655
@@ -70,8 +36,6 @@ CVE-2021-28678
[buster] - pillow 5.4.1-2+deb10u3
CVE-2021-34552
[buster] - pillow 5.4.1-2+deb10u3
-CVE-2021-3801
- [buster] - node-prismjs 1.11.0+dfsg-3+deb10u1
CVE-2020-28600
[buster] - openscad 2019.01~RC2-2+deb10u1
CVE-2020-28599
@@ -270,6 +234,60 @@ CVE-2022-23960
[buster] - linux 4.19.235-1
CVE-2022-24958
[buster] - linux 4.19.235-1
+CVE-2020-10001
+ [buster] - cups 2.2.10-6+deb10u5
+CVE-2021-46709
+ [buster] - phpliteadmin 1.9.7.1-2+deb10u1
+CVE-2021-33120
+ [buster] - intel-microcode 3.20220207.1~deb10u1
+CVE-2021-0145
+ [buster] - intel-microcode 3.20220207.1~deb10u1
+CVE-2021-0127
+ [buster] - intel-microcode 3.20220207.1~deb10u1
+CVE-2021-44906
+ [buster] - node-minimist 1.2.0-1+deb10u2
+CVE-2022-24773
+ [buster] - node-node-forge 0.8.1~dfsg-1+deb10u1
+CVE-2022-24772
+ [buster] - node-node-forge 0.8.1~dfsg-1+deb10u1
+CVE-2022-24771
+ [buster] - node-node-forge 0.8.1~dfsg-1+deb10u1
+CVE-2019-20446
+ [buster] - librsvg 2.44.10-2.1+deb10u1
+CVE-2019-17134
+ [buster] - octavia 3.0.0-3+deb10u1
+CVE-2019-14433
+ [buster] - nova 2:18.1.0-6+deb10u1
+CVE-2019-14857
+ [buster] - libapache2-mod-auth-openidc 2.3.10.2-1+deb10u1
+CVE-2020-8492
+ [buster] - python2.7 2.7.16-2+deb10u2
+CVE-2019-20907
+ [buster] - python2.7 2.7.16-2+deb10u2
+CVE-2021-3177
+ [buster] - python2.7 2.7.16-2+deb10u2
+CVE-2020-24583
+ [buster] - python-django 1:1.11.29-1~deb10u2
+CVE-2020-24584
+ [buster] - python-django 1:1.11.29-1~deb10u2
+CVE-2021-3281
+ [buster] - python-django 1:1.11.29-1~deb10u2
+CVE-2021-23336
+ [buster] - python-django 1:1.11.29-1~deb10u2
+CVE-2020-4051
+ [buster] - dojo 1.14.2+dfsg1-1+deb10u3
+CVE-2021-32062
+ [buster] - mapserver 7.2.2-1+deb10u1
+CVE-2020-35572
+ [buster] - adminer 4.7.1-1+deb10u1
+CVE-2021-21311
+ [buster] - adminer 4.7.1-1+deb10u1
+CVE-2021-29625
+ [buster] - adminer 4.7.1-1+deb10u1
+CVE-2021-35525
+ [buster] - postsrsd 1.5-2+deb10u2
+CVE-2021-3801
+ [buster] - node-prismjs 1.11.0+dfsg-3+deb10u1
CVE-2021-3930
[buster] - qemu 1:3.1+dfsg-8+deb10u9
CVE-2021-3748
@@ -318,21 +336,3 @@ CVE-2020-15859
[buster] - qemu 1:3.1+dfsg-8+deb10u9
CVE-2020-13253
[buster] - qemu 1:3.1+dfsg-8+deb10u9
-CVE-2020-10001
- [buster] - cups 2.2.10-6+deb10u5
-CVE-2021-46709
- [buster] - phpliteadmin 1.9.7.1-2+deb10u1
-CVE-2021-33120
- [buster] - intel-microcode 3.20220207.1~deb10u1
-CVE-2021-0145
- [buster] - intel-microcode 3.20220207.1~deb10u1
-CVE-2021-0127
- [buster] - intel-microcode 3.20220207.1~deb10u1
-CVE-2021-44906
- [buster] - node-minimist 1.2.0-1+deb10u2
-CVE-2022-24773
- [buster] - node-node-forge 0.8.1~dfsg-1+deb10u1
-CVE-2022-24772
- [buster] - node-node-forge 0.8.1~dfsg-1+deb10u1
-CVE-2022-24771
- [buster] - node-node-forge 0.8.1~dfsg-1+deb10u1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/62cd59b9f7cb49846d1344b1bd0a72a641b4fb23
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/62cd59b9f7cb49846d1344b1bd0a72a641b4fb23
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220325/cf5fc5a7/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list