[Git][security-tracker-team/security-tracker][master] Review list of bookworm-pu updates (likely) accepted in 12.3
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Dec 7 21:57:48 GMT 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
53ef72db by Salvatore Bonaccorso at 2023-12-07T22:56:59+01:00
Review list of bookworm-pu updates (likely) accepted in 12.3
Move those which do not even have an upload now to the end of the list.
- - - - -
1 changed file:
- data/next-point-update.txt
Changes:
=====================================
data/next-point-update.txt
=====================================
@@ -2,52 +2,16 @@ CVE-2023-41887
[bookworm] - openrefine 3.6.2-2+deb12u2
CVE-2023-41886
[bookworm] - openrefine 3.6.2-2+deb12u2
-CVE-2023-3153
- [bookworm] - ovn 23.03.1-1~deb12u1
-CVE-2023-43040
- [bookworm] - ceph 16.2.11+ds-2+deb12u1
CVE-2023-40743
[bookworm] - axis 1.4-28+deb12u1
CVE-2023-45143
[bookworm] - node-undici 5.15.0+dfsg1+~cs20.10.9.3-1+deb12u2
-CVE-2023-40481
- [bookworm] - 7zip 22.01+dfsg-8+deb12u1
-CVE-2023-31102
- [bookworm] - 7zip 22.01+dfsg-8+deb12u1
CVE-2023-46586
[bookworm] - weborf 0.19-3
-CVE-2023-3724
- [bookworm] - wolfssl 5.5.4-2+deb12u1
CVE-2023-42117
[bookworm] - exim4 4.96-15+deb12u3
CVE-2023-42119
[bookworm] - exim4 4.96-15+deb12u3
-CVE-2023-39350
- [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-39351
- [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-39352
- [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-39353
- [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-39354
- [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-39356
- [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-40181
- [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-40186
- [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-40188
- [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-40567
- [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-40569
- [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-40589
- [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-4039
- [bookworm] - gcc-12 12.2.0-14+deb12u1
CVE-2023-45897
[bookworm] - exfatprogs 1.2.0-1+deb12u1
CVE-2023-4535
@@ -58,12 +22,6 @@ CVE-2023-40661
[bookworm] - opensc 0.23.0-0.3+deb12u1
CVE-2023-40032
[bookworm] - vips 8.14.1-3+deb12u1
-CVE-2023-34410
- [bookworm] - qtbase-opensource-src 5.15.8+dfsg-11+deb12u1
-CVE-2023-37369
- [bookworm] - qtbase-opensource-src 5.15.8+dfsg-11+deb12u1
-CVE-2023-38197
- [bookworm] - qtbase-opensource-src 5.15.8+dfsg-11+deb12u1
CVE-2023-46734
[bookworm] - symfony 5.4.23+dfsg-1+deb12u1
CVE-2023-46733
@@ -91,14 +49,10 @@ CVE-2023-43887
[bookworm] - libde265 1.0.11-1+deb12u1
CVE-2023-47471
[bookworm] - libde265 1.0.11-1+deb12u1
-CVE-2023-49208
- [bookworm] - glewlwyd 2.7.5-3+deb12u1
CVE-2023-49316
[bookworm] - php-phpseclib3 3.0.19-1+deb12u1
CVE-2023-5981
[bookworm] - gnutls28 3.7.9-2+deb12u1
-CVE-2023-22084
- [bookworm] - mariadb 1:10.11.6-0+deb12u1
CVE-2023-34320
[bookworm] - xen 4.17.2+76-ge1f9cb16e2-1~deb12u1
CVE-2023-34328
@@ -149,3 +103,49 @@ CVE-2023-6111
[bookworm] - linux 6.1.64-1
CVE-2023-6121
[bookworm] - linux 6.1.64-1
+CVE-2023-3153
+ [bookworm] - ovn 23.03.1-1~deb12u1
+CVE-2023-43040
+ [bookworm] - ceph 16.2.11+ds-2+deb12u1
+CVE-2023-40481
+ [bookworm] - 7zip 22.01+dfsg-8+deb12u1
+CVE-2023-31102
+ [bookworm] - 7zip 22.01+dfsg-8+deb12u1
+CVE-2023-3724
+ [bookworm] - wolfssl 5.5.4-2+deb12u1
+CVE-2023-39350
+ [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-39351
+ [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-39352
+ [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-39353
+ [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-39354
+ [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-39356
+ [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-40181
+ [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-40186
+ [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-40188
+ [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-40567
+ [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-40569
+ [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-40589
+ [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-4039
+ [bookworm] - gcc-12 12.2.0-14+deb12u1
+CVE-2023-34410
+ [bookworm] - qtbase-opensource-src 5.15.8+dfsg-11+deb12u1
+CVE-2023-37369
+ [bookworm] - qtbase-opensource-src 5.15.8+dfsg-11+deb12u1
+CVE-2023-38197
+ [bookworm] - qtbase-opensource-src 5.15.8+dfsg-11+deb12u1
+CVE-2023-49208
+ [bookworm] - glewlwyd 2.7.5-3+deb12u1
+CVE-2023-22084
+ [bookworm] - mariadb 1:10.11.6-0+deb12u1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/53ef72dba617820b87d106b6c72973e02ad16740
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/53ef72dba617820b87d106b6c72973e02ad16740
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231207/ac71fa9e/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list