[Git][security-tracker-team/security-tracker][master] Review list of bookworm-pu updates (likely) accepted in 12.3

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Dec 7 21:57:48 GMT 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
53ef72db by Salvatore Bonaccorso at 2023-12-07T22:56:59+01:00
Review list of bookworm-pu updates (likely) accepted in 12.3

Move those which do not even have an upload now to the end of the list.

- - - - -


1 changed file:

- data/next-point-update.txt


Changes:

=====================================
data/next-point-update.txt
=====================================
@@ -2,52 +2,16 @@ CVE-2023-41887
 	[bookworm] - openrefine 3.6.2-2+deb12u2
 CVE-2023-41886
 	[bookworm] - openrefine 3.6.2-2+deb12u2
-CVE-2023-3153
-	[bookworm] - ovn 23.03.1-1~deb12u1
-CVE-2023-43040
-	[bookworm] - ceph 16.2.11+ds-2+deb12u1
 CVE-2023-40743
 	[bookworm] - axis 1.4-28+deb12u1
 CVE-2023-45143
 	[bookworm] - node-undici 5.15.0+dfsg1+~cs20.10.9.3-1+deb12u2
-CVE-2023-40481
-	[bookworm] - 7zip 22.01+dfsg-8+deb12u1
-CVE-2023-31102
-	[bookworm] - 7zip 22.01+dfsg-8+deb12u1
 CVE-2023-46586
 	[bookworm] - weborf 0.19-3
-CVE-2023-3724
-	[bookworm] - wolfssl 5.5.4-2+deb12u1
 CVE-2023-42117
 	[bookworm] - exim4 4.96-15+deb12u3
 CVE-2023-42119
 	[bookworm] - exim4 4.96-15+deb12u3
-CVE-2023-39350
-	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-39351
-	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-39352
-	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-39353
-	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-39354
-	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-39356
-	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-40181
-	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-40186
-	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-40188
-	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-40567
-	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-40569
-	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-40589
-	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
-CVE-2023-4039
-	[bookworm] - gcc-12 12.2.0-14+deb12u1
 CVE-2023-45897
 	[bookworm] - exfatprogs 1.2.0-1+deb12u1
 CVE-2023-4535
@@ -58,12 +22,6 @@ CVE-2023-40661
 	[bookworm] - opensc 0.23.0-0.3+deb12u1
 CVE-2023-40032
 	[bookworm] - vips 8.14.1-3+deb12u1
-CVE-2023-34410
-	[bookworm] - qtbase-opensource-src 5.15.8+dfsg-11+deb12u1
-CVE-2023-37369
-	[bookworm] - qtbase-opensource-src 5.15.8+dfsg-11+deb12u1
-CVE-2023-38197
-	[bookworm] - qtbase-opensource-src 5.15.8+dfsg-11+deb12u1
 CVE-2023-46734
 	[bookworm] - symfony 5.4.23+dfsg-1+deb12u1
 CVE-2023-46733
@@ -91,14 +49,10 @@ CVE-2023-43887
 	[bookworm] - libde265 1.0.11-1+deb12u1
 CVE-2023-47471
 	[bookworm] - libde265 1.0.11-1+deb12u1
-CVE-2023-49208
-	[bookworm] - glewlwyd 2.7.5-3+deb12u1
 CVE-2023-49316
 	[bookworm] - php-phpseclib3 3.0.19-1+deb12u1
 CVE-2023-5981
 	[bookworm] - gnutls28 3.7.9-2+deb12u1
-CVE-2023-22084
-	[bookworm] - mariadb 1:10.11.6-0+deb12u1
 CVE-2023-34320
 	[bookworm] - xen 4.17.2+76-ge1f9cb16e2-1~deb12u1
 CVE-2023-34328
@@ -149,3 +103,49 @@ CVE-2023-6111
 	[bookworm] - linux 6.1.64-1
 CVE-2023-6121
 	[bookworm] - linux 6.1.64-1
+CVE-2023-3153
+	[bookworm] - ovn 23.03.1-1~deb12u1
+CVE-2023-43040
+	[bookworm] - ceph 16.2.11+ds-2+deb12u1
+CVE-2023-40481
+	[bookworm] - 7zip 22.01+dfsg-8+deb12u1
+CVE-2023-31102
+	[bookworm] - 7zip 22.01+dfsg-8+deb12u1
+CVE-2023-3724
+	[bookworm] - wolfssl 5.5.4-2+deb12u1
+CVE-2023-39350
+	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-39351
+	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-39352
+	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-39353
+	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-39354
+	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-39356
+	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-40181
+	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-40186
+	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-40188
+	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-40567
+	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-40569
+	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-40589
+	[bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-4039
+	[bookworm] - gcc-12 12.2.0-14+deb12u1
+CVE-2023-34410
+	[bookworm] - qtbase-opensource-src 5.15.8+dfsg-11+deb12u1
+CVE-2023-37369
+	[bookworm] - qtbase-opensource-src 5.15.8+dfsg-11+deb12u1
+CVE-2023-38197
+	[bookworm] - qtbase-opensource-src 5.15.8+dfsg-11+deb12u1
+CVE-2023-49208
+	[bookworm] - glewlwyd 2.7.5-3+deb12u1
+CVE-2023-22084
+	[bookworm] - mariadb 1:10.11.6-0+deb12u1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/53ef72dba617820b87d106b6c72973e02ad16740

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/53ef72dba617820b87d106b6c72973e02ad16740
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231207/ac71fa9e/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list