[Git][security-tracker-team/security-tracker][master] Review list of bullseye-pu updates (move unaccepted ones to end of list)

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Oct 6 05:42:15 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
9438aa57 by Salvatore Bonaccorso at 2023-10-06T06:41:36+02:00
Review list of bullseye-pu updates (move unaccepted ones to end of list)

- - - - -


1 changed file:

- data/next-oldstable-point-update.txt


Changes:

=====================================
data/next-oldstable-point-update.txt
=====================================
@@ -1,41 +1,5 @@
-CVE-2022-3650
-	[bullseye] - ceph 14.2.21-1+deb11u1
-CVE-2021-32718
-	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-32719
-	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-22116
-	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2018-1279
-	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-3654
-	[bullseye] - nova 2:22.2.2-1+deb11u1
-CVE-2022-27240
-	[bullseye] - glewlwyd 2.5.2-2+deb11u3
-CVE-2022-29967
-	[bullseye] - glewlwyd 2.5.2-2+deb11u3
-CVE-2022-32096
-	[bullseye] - rhonabwy 0.9.13-3+deb11u2
-CVE-2021-24119
-	[bullseye] - mbedtls 2.16.12-0+deb11u1
-CVE-2021-44732
-	[bullseye] - mbedtls 2.16.12-0+deb11u1
-CVE-2022-2996
-	[bullseye] - python-scciclient 0.8.0-2+deb11u1
-CVE-2022-42961
-	[bullseye] - wolfssl 4.6.0+p1-0+deb11u2
-CVE-2022-39173
-	[bullseye] - wolfssl 4.6.0+p1-0+deb11u2
-CVE-2022-42905
-	[bullseye] - wolfssl 4.6.0+p1-0+deb11u2
 CVE-2022-46175
 	[bullseye] - node-json5 2.1.3-2+deb11u1
-CVE-2022-24859
-	[bullseye] - pypdf2 1.26.0-4+deb11u1
-CVE-2022-48279
-	[bullseye] - modsecurity-apache 2.9.3-3+deb11u2
-CVE-2023-24021
-	[bullseye] - modsecurity-apache 2.9.3-3+deb11u2
 CVE-2022-21222
 	[bullseye] - node-css-what 4.0.0-3+deb11u1
 CVE-2021-33587
@@ -46,8 +10,6 @@ CVE-2021-22570
 	[bullseye] - protobuf 3.12.4-1+deb11u1
 CVE-2022-1941
 	[bullseye] - protobuf 3.12.4-1+deb11u1
-CVE-2023-0842
-	[bullseye] - node-xml2js 0.2.8-1+deb11u1
 CVE-2023-29197
 	[bullseye] - php-guzzlehttp-psr7 1.7.0-1+deb11u2
 	[bullseye] - php-nyholm-psr7 1.3.2-2+deb11u1
@@ -79,8 +41,6 @@ CVE-2021-33797
 	[bullseye] - mujs 1.1.0-1+deb11u3
 CVE-2023-29491
 	[bullseye] - ncurses 6.2+20201114-2+deb11u2
-CVE-2022-0512
-	[bullseye] - node-url-parse 1.5.3-1+deb11u2
 CVE-2022-1537
 	[bullseye] - grunt 1.3.0-1+deb11u2
 CVE-2023-30570
@@ -89,32 +49,6 @@ CVE-2022-47015
 	[bullseye] - mariadb-10.5 1:10.5.20-0+deb11u1
 CVE-2023-28617
 	[bullseye] - org-mode 9.4.0+dfsg-1+deb11u1
-CVE-2021-3574
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-4219
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20241
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20243
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20244
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20245
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20246
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20309
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-39212
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2022-1114
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2022-28463
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2022-32545
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2022-32546
-	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
 CVE-2023-34969
 	[bullseye] - dbus 1.12.28-0+deb11u1
 CVE-2023-34241
@@ -145,10 +79,6 @@ CVE-2023-25515
 	[bullseye] - nvidia-graphics-drivers 470.199.02-1
 CVE-2023-1672
 	[bullseye] - tang 8-3+deb11u2
-CVE-2023-26136
-	[bullseye] - node-tough-cookie 4.0.0-2+deb11u1
-CVE-2023-26132
-	[bullseye] - node-dottie 2.0.2-4+deb11u1
 CVE-2023-XXXX [spip: Use a dedicated function to clean author data when preparing a session]
 	[bullseye] - spip 3.2.11-3+deb11u9
 CVE-2023-37365
@@ -270,3 +200,73 @@ CVE-2023-29499
 	[bullseye] - glib2.0 2.66.8-1+deb11u1
 CVE-2023-5157
 	[bullseye] - galera-4 26.4.14-0+deb11u1
+CVE-2022-3650
+	[bullseye] - ceph 14.2.21-1+deb11u1
+CVE-2021-32718
+	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-32719
+	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-22116
+	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2018-1279
+	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-3654
+	[bullseye] - nova 2:22.2.2-1+deb11u1
+CVE-2022-27240
+	[bullseye] - glewlwyd 2.5.2-2+deb11u3
+CVE-2022-29967
+	[bullseye] - glewlwyd 2.5.2-2+deb11u3
+CVE-2021-24119
+	[bullseye] - mbedtls 2.16.12-0+deb11u1
+CVE-2021-44732
+	[bullseye] - mbedtls 2.16.12-0+deb11u1
+CVE-2022-32096
+	[bullseye] - rhonabwy 0.9.13-3+deb11u2
+CVE-2022-2996
+	[bullseye] - python-scciclient 0.8.0-2+deb11u1
+CVE-2022-42961
+	[bullseye] - wolfssl 4.6.0+p1-0+deb11u2
+CVE-2022-39173
+	[bullseye] - wolfssl 4.6.0+p1-0+deb11u2
+CVE-2022-42905
+	[bullseye] - wolfssl 4.6.0+p1-0+deb11u2
+CVE-2022-24859
+	[bullseye] - pypdf2 1.26.0-4+deb11u1
+CVE-2022-48279
+	[bullseye] - modsecurity-apache 2.9.3-3+deb11u2
+CVE-2023-24021
+	[bullseye] - modsecurity-apache 2.9.3-3+deb11u2
+CVE-2023-0842
+	[bullseye] - node-xml2js 0.2.8-1+deb11u1
+CVE-2022-0512
+	[bullseye] - node-url-parse 1.5.3-1+deb11u2
+CVE-2021-3574
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-4219
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20241
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20243
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20244
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20245
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20246
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20309
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-39212
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-1114
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-28463
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-32545
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-32546
+	[bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2023-26136
+	[bullseye] - node-tough-cookie 4.0.0-2+deb11u1
+CVE-2023-26132
+	[bullseye] - node-dottie 2.0.2-4+deb11u1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9438aa5770b9d5ec0571b4ce69da80bcd5697dd3

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9438aa5770b9d5ec0571b4ce69da80bcd5697dd3
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231006/759b60bc/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list