[Git][security-tracker-team/security-tracker][master] Review list of bullseye-pu pending uploads for 11.7

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Apr 28 05:40:27 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
b237e703 by Salvatore Bonaccorso at 2023-04-28T06:39:40+02:00
Review list of bullseye-pu pending uploads for 11.7

Shuffle the list and put on top the one accepted already.

- - - - -


1 changed file:

- data/next-point-update.txt


Changes:

=====================================
data/next-point-update.txt
=====================================
@@ -1,37 +1,7 @@
-CVE-2022-3650
-	[bullseye] - ceph 14.2.21-1+deb11u1
 CVE-2022-37026
 	[bullseye] - erlang 1:23.2.6+dfsg-1+deb11u1
-CVE-2021-32718
-	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-32719
-	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-22116
-	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2018-1279
-	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-3654
-	[bullseye] - nova 2:22.2.2-1+deb11u1
-CVE-2022-27240
-	[bullseye] - glewlwyd 2.5.2-2+deb11u3
-CVE-2022-29967
-	[bullseye] - glewlwyd 2.5.2-2+deb11u3
-CVE-2022-32096
-	[bullseye] - rhonabwy 0.9.13-3+deb11u2
 CVE-2022-28737
 	[bullseye] - shim 15.6-1~deb11u1
-CVE-2021-24119
-	[bullseye] - mbedtls 2.16.12-0+deb11u1
-CVE-2021-44732
-	[bullseye] - mbedtls 2.16.12-0+deb11u1
-CVE-2022-2996
-	[bullseye] - python-scciclient 0.8.0-2+deb11u1
-CVE-2022-42961
-	[bullseye] - wolfssl 4.6.0+p1-0+deb11u2
-CVE-2022-39173
-	[bullseye] - wolfssl 4.6.0+p1-0+deb11u2
-CVE-2022-42905
-	[bullseye] - wolfssl 4.6.0+p1-0+deb11u2
 CVE-2022-46146
 	[bullseye] - golang-github-prometheus-exporter-toolkit 0.5.1-2+deb11u2
 CVE-2022-23527
@@ -80,10 +50,6 @@ CVE-2021-37622
 	[bullseye] - exiv2 0.27.3-3+deb11u2
 CVE-2021-37623
 	[bullseye] - exiv2 0.27.3-3+deb11u2
-CVE-2022-46175
-	[bullseye] - node-json5 2.1.3-2+deb11u1
-CVE-2022-24859
-	[bullseye] - pypdf2 1.26.0-4+deb11u1
 CVE-2022-47952
 	[bullseye] - lxc 1:4.0.6-2+deb11u2
 CVE-2022-22728
@@ -98,10 +64,6 @@ CVE-2022-46285
 	[bullseye] - libxpm 1:3.5.12-1.1~deb11u1
 CVE-2020-36646
 	[bullseye] - libzen 0.4.38-1+deb11u1
-CVE-2022-48279
-	[bullseye] - modsecurity-apache 2.9.3-3+deb11u2
-CVE-2023-24021
-	[bullseye] - modsecurity-apache 2.9.3-3+deb11u2
 CVE-2022-24895
 	[bullseye] - symfony 4.4.19+dfsg-2+deb11u2
 CVE-2022-24894
@@ -136,10 +98,6 @@ CVE-2023-22742
 	[bullseye] - libgit2 1.1.0+dfsg.1-4+deb11u1
 CVE-2022-25901
 	[bullseye] - node-cookiejar 2.1.2-1+deb11u1
-CVE-2022-21222
-	[bullseye] - node-css-what 4.0.0-3+deb11u1
-CVE-2021-33587
-	[bullseye] - node-css-what 4.0.0-3+deb11u1
 CVE-2023-28154
 	[bullseye] - node-webpack 4.43.0-6+deb11u1
 CVE-2022-21216
@@ -223,17 +181,6 @@ CVE-2023-0191
 	[bullseye] - nvidia-graphics-drivers-tesla-450 450.236.01-1~deb11u1
 CVE-2022-27649
 	[bullseye] - libpod 3.0.1+dfsg1-3+deb11u2
-CVE-2021-22569
-	[bullseye] - protobuf 3.12.4-1+deb11u1
-CVE-2021-22570
-	[bullseye] - protobuf 3.12.4-1+deb11u1
-CVE-2022-1941
-	[bullseye] - protobuf 3.12.4-1+deb11u1
-CVE-2023-0842
-	[bullseye] - node-xml2js 0.2.8-1+deb11u1
-CVE-2023-29197
-	[bullseye] - php-guzzlehttp-psr7 1.7.0-1+deb11u2
-	[bullseye] - php-nyholm-psr7 1.3.2-2+deb11u1
 CVE-2022-2196
 	[bullseye] - linux 5.10.178-1
 CVE-2022-3424
@@ -312,3 +259,56 @@ CVE-2023-30456
 	[bullseye] - linux 5.10.178-1
 CVE-2023-30772
 	[bullseye] - linux 5.10.178-1
+CVE-2022-3650
+	[bullseye] - ceph 14.2.21-1+deb11u1
+CVE-2021-32718
+	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-32719
+	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-22116
+	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2018-1279
+	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-3654
+	[bullseye] - nova 2:22.2.2-1+deb11u1
+CVE-2022-27240
+	[bullseye] - glewlwyd 2.5.2-2+deb11u3
+CVE-2022-29967
+	[bullseye] - glewlwyd 2.5.2-2+deb11u3
+CVE-2022-32096
+	[bullseye] - rhonabwy 0.9.13-3+deb11u2
+CVE-2021-24119
+	[bullseye] - mbedtls 2.16.12-0+deb11u1
+CVE-2021-44732
+	[bullseye] - mbedtls 2.16.12-0+deb11u1
+CVE-2022-2996
+	[bullseye] - python-scciclient 0.8.0-2+deb11u1
+CVE-2022-42961
+	[bullseye] - wolfssl 4.6.0+p1-0+deb11u2
+CVE-2022-39173
+	[bullseye] - wolfssl 4.6.0+p1-0+deb11u2
+CVE-2022-42905
+	[bullseye] - wolfssl 4.6.0+p1-0+deb11u2
+CVE-2022-46175
+	[bullseye] - node-json5 2.1.3-2+deb11u1
+CVE-2022-24859
+	[bullseye] - pypdf2 1.26.0-4+deb11u1
+CVE-2022-48279
+	[bullseye] - modsecurity-apache 2.9.3-3+deb11u2
+CVE-2023-24021
+	[bullseye] - modsecurity-apache 2.9.3-3+deb11u2
+CVE-2022-21222
+	[bullseye] - node-css-what 4.0.0-3+deb11u1
+CVE-2021-33587
+	[bullseye] - node-css-what 4.0.0-3+deb11u1
+CVE-2021-22569
+	[bullseye] - protobuf 3.12.4-1+deb11u1
+CVE-2021-22570
+	[bullseye] - protobuf 3.12.4-1+deb11u1
+CVE-2022-1941
+	[bullseye] - protobuf 3.12.4-1+deb11u1
+CVE-2023-0842
+	[bullseye] - node-xml2js 0.2.8-1+deb11u1
+CVE-2023-29197
+	[bullseye] - php-guzzlehttp-psr7 1.7.0-1+deb11u2
+	[bullseye] - php-nyholm-psr7 1.3.2-2+deb11u1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b237e7036f9e0947c6cb96f1161d22b16b182806

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b237e7036f9e0947c6cb96f1161d22b16b182806
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230428/49158e8f/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list