[Git][security-tracker-team/security-tracker][master] 6 commits: data/config.json: Update mapping release -> codenames
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sat Jun 10 10:51:57 BST 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
9d590e83 by Salvatore Bonaccorso at 2023-06-08T17:46:02+02:00
data/config.json: Update mapping release -> codenames
Make buster the oldoldstable distribution, bullseye the oldstable
distribution and bookworm the new stable distribution.
Mark trixie as the new testing distribution and sync supported
architecture lists for now with the cut-off as given for bookworm.
Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>
- - - - -
60ee1a97 by Salvatore Bonaccorso at 2023-06-08T17:46:02+02:00
DSA.template: Add support for oldstable version information in DSA
Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>
- - - - -
1187d7c8 by Salvatore Bonaccorso at 2023-06-08T17:46:02+02:00
List packages from oldstable and stable for dsa-needed list
Include in listing the oldstable distribution by enabling the boolean
value "include_oldstable" to true and so enabling the including logic
later on in the script.
Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>
- - - - -
f1967f98 by Salvatore Bonaccorso at 2023-06-08T17:46:03+02:00
distributions.json: Mark bookworm as supported by the Debian security team
Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>
- - - - -
48b4ba56 by Salvatore Bonaccorso at 2023-06-08T17:46:26+02:00
Move next-point-update.txt to next-oldstable-point-update.txt
All what is potentially pending for the next bullseye point release is
not to be considered for the next stable point update. Make an empty
list for bookworm (stable).
Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>
- - - - -
53b32147 by Salvatore Bonaccorso at 2023-06-10T09:51:45+00:00
Merge branch 'bookworm-release' into 'master'
Preparations for the security-tracker for the bookworm release
See merge request security-tracker-team/security-tracker!127
- - - - -
6 changed files:
- bin/add-dsa-needed.sh
- data/config.json
- data/next-oldstable-point-update.txt
- data/next-point-update.txt
- doc/DSA.template
- static/distributions.json
Changes:
=====================================
bin/add-dsa-needed.sh
=====================================
@@ -20,7 +20,7 @@
set -eu
-include_oldstable=false
+include_oldstable=true
turl="https://security-tracker.debian.org/tracker/status/release"
[ -f data/dsa-needed.txt ] || {
=====================================
data/config.json
=====================================
@@ -82,7 +82,7 @@
]
},
"architectures": [ "amd64", "arm64", "armhf", "i386" ],
- "release": "oldstable"
+ "release": "oldoldstable"
},
"bullseye": {
"members": {
@@ -95,7 +95,7 @@
]
},
"architectures": [ "amd64", "arm64", "armel", "armhf", "i386", "mips64el", "mipsel", "ppc64el", "s390x" ],
- "release": "stable"
+ "release": "oldstable"
},
"bookworm": {
"members": {
@@ -108,7 +108,7 @@
]
},
"architectures": [ "amd64", "arm64", "armel", "armhf", "i386", "mips64el", "mipsel", "ppc64el", "s390x" ],
- "release": "testing"
+ "release": "stable"
},
"trixie": {
"members": {
@@ -119,7 +119,9 @@
"optional": [
"trixie-proposed-updates"
]
- }
+ },
+ "architectures": [ "amd64", "arm64", "armel", "armhf", "i386", "mips64el", "mipsel", "ppc64el", "s390x" ],
+ "release": "testing"
},
"forky": {
"members": {
=====================================
data/next-oldstable-point-update.txt
=====================================
@@ -1,4 +1,119 @@
-CVE-2019-14433
- [buster] - nova 2:18.1.0-6+deb10u1
-CVE-2022-28737
- [buster] - shim 15.6-1~deb10u1
+CVE-2022-3650
+ [bullseye] - ceph 14.2.21-1+deb11u1
+CVE-2021-32718
+ [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-32719
+ [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-22116
+ [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2018-1279
+ [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-3654
+ [bullseye] - nova 2:22.2.2-1+deb11u1
+CVE-2022-27240
+ [bullseye] - glewlwyd 2.5.2-2+deb11u3
+CVE-2022-29967
+ [bullseye] - glewlwyd 2.5.2-2+deb11u3
+CVE-2022-32096
+ [bullseye] - rhonabwy 0.9.13-3+deb11u2
+CVE-2021-24119
+ [bullseye] - mbedtls 2.16.12-0+deb11u1
+CVE-2021-44732
+ [bullseye] - mbedtls 2.16.12-0+deb11u1
+CVE-2022-2996
+ [bullseye] - python-scciclient 0.8.0-2+deb11u1
+CVE-2022-42961
+ [bullseye] - wolfssl 4.6.0+p1-0+deb11u2
+CVE-2022-39173
+ [bullseye] - wolfssl 4.6.0+p1-0+deb11u2
+CVE-2022-42905
+ [bullseye] - wolfssl 4.6.0+p1-0+deb11u2
+CVE-2022-46175
+ [bullseye] - node-json5 2.1.3-2+deb11u1
+CVE-2022-24859
+ [bullseye] - pypdf2 1.26.0-4+deb11u1
+CVE-2022-48279
+ [bullseye] - modsecurity-apache 2.9.3-3+deb11u2
+CVE-2023-24021
+ [bullseye] - modsecurity-apache 2.9.3-3+deb11u2
+CVE-2022-21222
+ [bullseye] - node-css-what 4.0.0-3+deb11u1
+CVE-2021-33587
+ [bullseye] - node-css-what 4.0.0-3+deb11u1
+CVE-2021-22569
+ [bullseye] - protobuf 3.12.4-1+deb11u1
+CVE-2021-22570
+ [bullseye] - protobuf 3.12.4-1+deb11u1
+CVE-2022-1941
+ [bullseye] - protobuf 3.12.4-1+deb11u1
+CVE-2023-0842
+ [bullseye] - node-xml2js 0.2.8-1+deb11u1
+CVE-2023-29197
+ [bullseye] - php-guzzlehttp-psr7 1.7.0-1+deb11u2
+ [bullseye] - php-nyholm-psr7 1.3.2-2+deb11u1
+CVE-2021-45423
+ [bullseye] - pev 0.81-3+deb11u1
+CVE-2023-24291
+ [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-2428
+ [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-24287
+ [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-24285
+ [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-24284
+ [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-24283
+ [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-27533
+ [bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2023-27534
+ [bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2023-27535
+ [bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2023-27536
+ [bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2023-27538
+ [bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2021-33797
+ [bullseye] - mujs 1.1.0-1+deb11u3
+CVE-2023-29491
+ [bullseye] - ncurses 6.2+20201114-2+deb11u2
+CVE-2022-0512
+ [bullseye] - node-url-parse 1.5.3-1+deb11u2
+CVE-2022-1537
+ [bullseye] - grunt 1.3.0-1+deb11u2
+CVE-2023-30570
+ [bullseye] - libreswan 4.3-1+deb11u4
+CVE-2022-47015
+ [bullseye] - mariadb-10.5 1:10.5.20-0+deb11u1
+CVE-2023-28617
+ [bullseye] - org-mode 9.4.0+dfsg-1+deb11u1
+CVE-2021-3574
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-4219
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20241
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20243
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20244
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20245
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20246
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20309
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-39212
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-1114
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-28463
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-32545
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-32546
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2023-34969
+ [bullseye] - dbus 1.12.28-0+deb11u1
=====================================
data/next-point-update.txt
=====================================
@@ -1,119 +0,0 @@
-CVE-2022-3650
- [bullseye] - ceph 14.2.21-1+deb11u1
-CVE-2021-32718
- [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-32719
- [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-22116
- [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2018-1279
- [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-3654
- [bullseye] - nova 2:22.2.2-1+deb11u1
-CVE-2022-27240
- [bullseye] - glewlwyd 2.5.2-2+deb11u3
-CVE-2022-29967
- [bullseye] - glewlwyd 2.5.2-2+deb11u3
-CVE-2022-32096
- [bullseye] - rhonabwy 0.9.13-3+deb11u2
-CVE-2021-24119
- [bullseye] - mbedtls 2.16.12-0+deb11u1
-CVE-2021-44732
- [bullseye] - mbedtls 2.16.12-0+deb11u1
-CVE-2022-2996
- [bullseye] - python-scciclient 0.8.0-2+deb11u1
-CVE-2022-42961
- [bullseye] - wolfssl 4.6.0+p1-0+deb11u2
-CVE-2022-39173
- [bullseye] - wolfssl 4.6.0+p1-0+deb11u2
-CVE-2022-42905
- [bullseye] - wolfssl 4.6.0+p1-0+deb11u2
-CVE-2022-46175
- [bullseye] - node-json5 2.1.3-2+deb11u1
-CVE-2022-24859
- [bullseye] - pypdf2 1.26.0-4+deb11u1
-CVE-2022-48279
- [bullseye] - modsecurity-apache 2.9.3-3+deb11u2
-CVE-2023-24021
- [bullseye] - modsecurity-apache 2.9.3-3+deb11u2
-CVE-2022-21222
- [bullseye] - node-css-what 4.0.0-3+deb11u1
-CVE-2021-33587
- [bullseye] - node-css-what 4.0.0-3+deb11u1
-CVE-2021-22569
- [bullseye] - protobuf 3.12.4-1+deb11u1
-CVE-2021-22570
- [bullseye] - protobuf 3.12.4-1+deb11u1
-CVE-2022-1941
- [bullseye] - protobuf 3.12.4-1+deb11u1
-CVE-2023-0842
- [bullseye] - node-xml2js 0.2.8-1+deb11u1
-CVE-2023-29197
- [bullseye] - php-guzzlehttp-psr7 1.7.0-1+deb11u2
- [bullseye] - php-nyholm-psr7 1.3.2-2+deb11u1
-CVE-2021-45423
- [bullseye] - pev 0.81-3+deb11u1
-CVE-2023-24291
- [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-2428
- [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-24287
- [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-24285
- [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-24284
- [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-24283
- [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-27533
- [bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2023-27534
- [bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2023-27535
- [bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2023-27536
- [bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2023-27538
- [bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2021-33797
- [bullseye] - mujs 1.1.0-1+deb11u3
-CVE-2023-29491
- [bullseye] - ncurses 6.2+20201114-2+deb11u2
-CVE-2022-0512
- [bullseye] - node-url-parse 1.5.3-1+deb11u2
-CVE-2022-1537
- [bullseye] - grunt 1.3.0-1+deb11u2
-CVE-2023-30570
- [bullseye] - libreswan 4.3-1+deb11u4
-CVE-2022-47015
- [bullseye] - mariadb-10.5 1:10.5.20-0+deb11u1
-CVE-2023-28617
- [bullseye] - org-mode 9.4.0+dfsg-1+deb11u1
-CVE-2021-3574
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-4219
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20241
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20243
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20244
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20245
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20246
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20309
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-39212
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2022-1114
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2022-28463
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2022-32545
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2022-32546
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2023-34969
- [bullseye] - dbus 1.12.28-0+deb11u1
=====================================
doc/DSA.template
=====================================
@@ -14,6 +14,9 @@ Debian Bug : $BUGNUM
$TEXT
+For the oldstable distribution ($OLDSTABLE), this problem has been fixed
+in version $$OLDSTABLE_VERSION.
+
For the stable distribution ($STABLE), this problem has been fixed in
version $$STABLE_VERSION.
=====================================
static/distributions.json
=====================================
@@ -26,8 +26,8 @@
},
"bookworm": {
"major-version": "12",
- "support": "none",
- "contact": ""
+ "support": "security",
+ "contact": "team at security.debian.org"
},
"trixie": {
"major-version": "13",
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/7294598b881b53e50db7da23e988c431c9b29c39...53b321474e59482396fe2c6d0c02bab601bc36b4
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/7294598b881b53e50db7da23e988c431c9b29c39...53b321474e59482396fe2c6d0c02bab601bc36b4
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230610/bf6f3493/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list