[Git][security-tracker-team/security-tracker][master] 6 commits: data/config.json: Update mapping release -> codenames

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sat Jun 10 10:51:57 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
9d590e83 by Salvatore Bonaccorso at 2023-06-08T17:46:02+02:00
data/config.json: Update mapping release -> codenames

Make buster the oldoldstable distribution, bullseye the oldstable
distribution and bookworm the new stable distribution.

Mark trixie as the new testing distribution and sync supported
architecture lists for now with the cut-off as given for bookworm.

Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>

- - - - -
60ee1a97 by Salvatore Bonaccorso at 2023-06-08T17:46:02+02:00
DSA.template: Add support for oldstable version information in DSA

Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>

- - - - -
1187d7c8 by Salvatore Bonaccorso at 2023-06-08T17:46:02+02:00
List packages from oldstable and stable for dsa-needed list

Include in listing the oldstable distribution by enabling the boolean
value "include_oldstable" to true and so enabling the including logic
later on in the script.

Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>

- - - - -
f1967f98 by Salvatore Bonaccorso at 2023-06-08T17:46:03+02:00
distributions.json: Mark bookworm as supported by the Debian security team

Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>

- - - - -
48b4ba56 by Salvatore Bonaccorso at 2023-06-08T17:46:26+02:00
Move next-point-update.txt to next-oldstable-point-update.txt

All what is potentially pending for the next bullseye point release is
not to be considered for the next stable point update. Make an empty
list for bookworm (stable).

Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>

- - - - -
53b32147 by Salvatore Bonaccorso at 2023-06-10T09:51:45+00:00
Merge branch 'bookworm-release' into 'master'

Preparations for the security-tracker for the bookworm release

See merge request security-tracker-team/security-tracker!127
- - - - -


6 changed files:

- bin/add-dsa-needed.sh
- data/config.json
- data/next-oldstable-point-update.txt
- data/next-point-update.txt
- doc/DSA.template
- static/distributions.json


Changes:

=====================================
bin/add-dsa-needed.sh
=====================================
@@ -20,7 +20,7 @@
 
 set -eu
 
-include_oldstable=false
+include_oldstable=true
 turl="https://security-tracker.debian.org/tracker/status/release"
 
 [ -f data/dsa-needed.txt ] || {


=====================================
data/config.json
=====================================
@@ -82,7 +82,7 @@
         ]
       },
       "architectures": [ "amd64", "arm64", "armhf", "i386" ],
-      "release": "oldstable"
+      "release": "oldoldstable"
     },
     "bullseye": {
       "members": {
@@ -95,7 +95,7 @@
         ]
       },
       "architectures": [ "amd64", "arm64", "armel", "armhf", "i386", "mips64el", "mipsel", "ppc64el", "s390x" ],
-      "release": "stable"
+      "release": "oldstable"
     },
     "bookworm": {
       "members": {
@@ -108,7 +108,7 @@
         ]
       },
       "architectures": [ "amd64", "arm64", "armel", "armhf", "i386", "mips64el", "mipsel", "ppc64el", "s390x" ],
-      "release": "testing"
+      "release": "stable"
     },
     "trixie": {
       "members": {
@@ -119,7 +119,9 @@
         "optional": [
           "trixie-proposed-updates"
         ]
-      }
+      },
+      "architectures": [ "amd64", "arm64", "armel", "armhf", "i386", "mips64el", "mipsel", "ppc64el", "s390x" ],
+      "release": "testing"
     },
     "forky": {
       "members": {


=====================================
data/next-oldstable-point-update.txt
=====================================
@@ -1,4 +1,119 @@
-CVE-2019-14433
-	[buster] - nova 2:18.1.0-6+deb10u1
-CVE-2022-28737
-	[buster] - shim 15.6-1~deb10u1
+CVE-2022-3650
+	[bullseye] - ceph 14.2.21-1+deb11u1
+CVE-2021-32718
+	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-32719
+	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-22116
+	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2018-1279
+	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-3654
+	[bullseye] - nova 2:22.2.2-1+deb11u1
+CVE-2022-27240
+	[bullseye] - glewlwyd 2.5.2-2+deb11u3
+CVE-2022-29967
+	[bullseye] - glewlwyd 2.5.2-2+deb11u3
+CVE-2022-32096
+	[bullseye] - rhonabwy 0.9.13-3+deb11u2
+CVE-2021-24119
+	[bullseye] - mbedtls 2.16.12-0+deb11u1
+CVE-2021-44732
+	[bullseye] - mbedtls 2.16.12-0+deb11u1
+CVE-2022-2996
+	[bullseye] - python-scciclient 0.8.0-2+deb11u1
+CVE-2022-42961
+	[bullseye] - wolfssl 4.6.0+p1-0+deb11u2
+CVE-2022-39173
+	[bullseye] - wolfssl 4.6.0+p1-0+deb11u2
+CVE-2022-42905
+	[bullseye] - wolfssl 4.6.0+p1-0+deb11u2
+CVE-2022-46175
+	[bullseye] - node-json5 2.1.3-2+deb11u1
+CVE-2022-24859
+	[bullseye] - pypdf2 1.26.0-4+deb11u1
+CVE-2022-48279
+	[bullseye] - modsecurity-apache 2.9.3-3+deb11u2
+CVE-2023-24021
+	[bullseye] - modsecurity-apache 2.9.3-3+deb11u2
+CVE-2022-21222
+	[bullseye] - node-css-what 4.0.0-3+deb11u1
+CVE-2021-33587
+	[bullseye] - node-css-what 4.0.0-3+deb11u1
+CVE-2021-22569
+	[bullseye] - protobuf 3.12.4-1+deb11u1
+CVE-2021-22570
+	[bullseye] - protobuf 3.12.4-1+deb11u1
+CVE-2022-1941
+	[bullseye] - protobuf 3.12.4-1+deb11u1
+CVE-2023-0842
+	[bullseye] - node-xml2js 0.2.8-1+deb11u1
+CVE-2023-29197
+	[bullseye] - php-guzzlehttp-psr7 1.7.0-1+deb11u2
+	[bullseye] - php-nyholm-psr7 1.3.2-2+deb11u1
+CVE-2021-45423
+	[bullseye] - pev 0.81-3+deb11u1
+CVE-2023-24291
+	[bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-2428
+	[bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-24287
+	[bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-24285
+	[bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-24284
+	[bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-24283
+	[bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-27533
+	[bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2023-27534
+	[bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2023-27535
+	[bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2023-27536
+	[bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2023-27538
+	[bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2021-33797
+	[bullseye] - mujs 1.1.0-1+deb11u3
+CVE-2023-29491
+	[bullseye] - ncurses 6.2+20201114-2+deb11u2
+CVE-2022-0512
+	[bullseye] - node-url-parse 1.5.3-1+deb11u2
+CVE-2022-1537
+	[bullseye] - grunt 1.3.0-1+deb11u2
+CVE-2023-30570
+	[bullseye] - libreswan 4.3-1+deb11u4
+CVE-2022-47015
+	[bullseye] - mariadb-10.5 1:10.5.20-0+deb11u1
+CVE-2023-28617
+	[bullseye] - org-mode 9.4.0+dfsg-1+deb11u1
+CVE-2021-3574
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-4219
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20241
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20243
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20244
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20245
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20246
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20309
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-39212
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-1114
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-28463
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-32545
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-32546
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2023-34969
+	[bullseye] - dbus 1.12.28-0+deb11u1


=====================================
data/next-point-update.txt
=====================================
@@ -1,119 +0,0 @@
-CVE-2022-3650
-	[bullseye] - ceph 14.2.21-1+deb11u1
-CVE-2021-32718
-	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-32719
-	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-22116
-	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2018-1279
-	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-3654
-	[bullseye] - nova 2:22.2.2-1+deb11u1
-CVE-2022-27240
-	[bullseye] - glewlwyd 2.5.2-2+deb11u3
-CVE-2022-29967
-	[bullseye] - glewlwyd 2.5.2-2+deb11u3
-CVE-2022-32096
-	[bullseye] - rhonabwy 0.9.13-3+deb11u2
-CVE-2021-24119
-	[bullseye] - mbedtls 2.16.12-0+deb11u1
-CVE-2021-44732
-	[bullseye] - mbedtls 2.16.12-0+deb11u1
-CVE-2022-2996
-	[bullseye] - python-scciclient 0.8.0-2+deb11u1
-CVE-2022-42961
-	[bullseye] - wolfssl 4.6.0+p1-0+deb11u2
-CVE-2022-39173
-	[bullseye] - wolfssl 4.6.0+p1-0+deb11u2
-CVE-2022-42905
-	[bullseye] - wolfssl 4.6.0+p1-0+deb11u2
-CVE-2022-46175
-	[bullseye] - node-json5 2.1.3-2+deb11u1
-CVE-2022-24859
-	[bullseye] - pypdf2 1.26.0-4+deb11u1
-CVE-2022-48279
-	[bullseye] - modsecurity-apache 2.9.3-3+deb11u2
-CVE-2023-24021
-	[bullseye] - modsecurity-apache 2.9.3-3+deb11u2
-CVE-2022-21222
-	[bullseye] - node-css-what 4.0.0-3+deb11u1
-CVE-2021-33587
-	[bullseye] - node-css-what 4.0.0-3+deb11u1
-CVE-2021-22569
-	[bullseye] - protobuf 3.12.4-1+deb11u1
-CVE-2021-22570
-	[bullseye] - protobuf 3.12.4-1+deb11u1
-CVE-2022-1941
-	[bullseye] - protobuf 3.12.4-1+deb11u1
-CVE-2023-0842
-	[bullseye] - node-xml2js 0.2.8-1+deb11u1
-CVE-2023-29197
-	[bullseye] - php-guzzlehttp-psr7 1.7.0-1+deb11u2
-	[bullseye] - php-nyholm-psr7 1.3.2-2+deb11u1
-CVE-2021-45423
-	[bullseye] - pev 0.81-3+deb11u1
-CVE-2023-24291
-	[bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-2428
-	[bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-24287
-	[bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-24285
-	[bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-24284
-	[bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-24283
-	[bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-27533
-	[bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2023-27534
-	[bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2023-27535
-	[bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2023-27536
-	[bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2023-27538
-	[bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2021-33797
-	[bullseye] - mujs 1.1.0-1+deb11u3
-CVE-2023-29491
-	[bullseye] - ncurses 6.2+20201114-2+deb11u2
-CVE-2022-0512
-	[bullseye] - node-url-parse 1.5.3-1+deb11u2
-CVE-2022-1537
-	[bullseye] - grunt 1.3.0-1+deb11u2
-CVE-2023-30570
-	[bullseye] - libreswan 4.3-1+deb11u4
-CVE-2022-47015
-	[bullseye] - mariadb-10.5 1:10.5.20-0+deb11u1
-CVE-2023-28617
-	[bullseye] - org-mode 9.4.0+dfsg-1+deb11u1
-CVE-2021-3574
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-4219
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20241
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20243
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20244
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20245
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20246
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20309
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-39212
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2022-1114
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2022-28463
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2022-32545
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2022-32546
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2023-34969
-	[bullseye] - dbus 1.12.28-0+deb11u1


=====================================
doc/DSA.template
=====================================
@@ -14,6 +14,9 @@ Debian Bug     : $BUGNUM
 
 $TEXT
 
+For the oldstable distribution ($OLDSTABLE), this problem has been fixed
+in version $$OLDSTABLE_VERSION.
+
 For the stable distribution ($STABLE), this problem has been fixed in
 version $$STABLE_VERSION.
 


=====================================
static/distributions.json
=====================================
@@ -26,8 +26,8 @@
   },
   "bookworm": {
     "major-version": "12",
-    "support": "none",
-    "contact": ""
+    "support": "security",
+    "contact": "team at security.debian.org"
   },
   "trixie": {
     "major-version": "13",



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/7294598b881b53e50db7da23e988c431c9b29c39...53b321474e59482396fe2c6d0c02bab601bc36b4

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/7294598b881b53e50db7da23e988c431c9b29c39...53b321474e59482396fe2c6d0c02bab601bc36b4
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230610/bf6f3493/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list