[Git][security-tracker-team/security-tracker][master] Review list of bullseye-pu updates (likely) accepted in 11.10

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Jun 28 22:10:24 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
450ad900 by Salvatore Bonaccorso at 2024-06-28T23:09:25+02:00
Review list of bullseye-pu updates (likely) accepted in 11.10

- - - - -


1 changed file:

- data/next-oldstable-point-update.txt


Changes:

=====================================
data/next-oldstable-point-update.txt
=====================================
@@ -1,27 +1,5 @@
 CVE-2023-5157
-	[bullseye] - galera-4 26.4.14-0+deb11u1
-CVE-2021-32718
-	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-32719
-	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-22116
-	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2018-1279
-	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-3654
-	[bullseye] - nova 2:22.2.2-1+deb11u1
-CVE-2022-27240
-	[bullseye] - glewlwyd 2.5.2-2+deb11u3
-CVE-2022-29967
-	[bullseye] - glewlwyd 2.5.2-2+deb11u3
-CVE-2023-49208
-	[bullseye] - glewlwyd 2.5.2-2+deb11u3
-CVE-2021-24119
-	[bullseye] - mbedtls 2.16.12-0+deb11u1
-CVE-2021-44732
-	[bullseye] - mbedtls 2.16.12-0+deb11u1
-CVE-2022-32096
-	[bullseye] - rhonabwy 0.9.13-3+deb11u2
+	[bullseye] - galera-4 26.4.18-0+deb11u1
 CVE-2022-2996
 	[bullseye] - python-scciclient 0.8.0-2+deb11u1
 CVE-2022-24859
@@ -30,8 +8,6 @@ CVE-2023-36810
 	[bullseye] - pypdf2 1.26.0-4+deb11u1
 CVE-2020-22218
 	[bullseye] - libssh2 1.9.0-2+deb11u1
-CVE-2022-22995
-	[bullseye] - netatalk 3.1.12~ds-8+deb11u2
 CVE-2022-22846
 	[bullseye] - python-dnslib 0.9.14-1+deb11u1
 CVE-2024-25189
@@ -110,18 +86,6 @@ CVE-2023-33285
 	[bullseye] - qtbase-opensource-src 5.15.2+dfsg-9+deb11u1
 CVE-2023-52160
 	[bullseye] - wpa 2:2.9.0-21+deb11u1
-CVE-2023-40546
-	[bullseye] - shim 15.8-1~deb11u1
-CVE-2023-40547
-	[bullseye] - shim 15.8-1~deb11u1
-CVE-2023-40548
-	[bullseye] - shim 15.8-1~deb11u1
-CVE-2023-40549
-	[bullseye] - shim 15.8-1~deb11u1
-CVE-2023-40550
-	[bullseye] - shim 15.8-1~deb11u1
-CVE-2023-40551
-	[bullseye] - shim 15.8-1~deb11u1
 CVE-2023-47855
 	[bullseye] - intel-microcode 3.20240514.1~deb11u1
 CVE-2023-45745
@@ -130,14 +94,6 @@ CVE-2023-46103
 	[bullseye] - intel-microcode 3.20240514.1~deb11u1
 CVE-2023-45733
 	[bullseye] - intel-microcode 3.20240514.1~deb11u1
-CVE-2021-43784
-	[bullseye] - runc 1.0.0~rc93+ds1-5+deb11u4
-CVE-2023-27561
-	[bullseye] - runc 1.0.0~rc93+ds1-5+deb11u4
-CVE-2023-25809
-	[bullseye] - runc 1.0.0~rc93+ds1-5+deb11u4
-CVE-2023-28642
-	[bullseye] - runc 1.0.0~rc93+ds1-5+deb11u4
 CVE-2024-0090
 	[bullseye] - nvidia-graphics-drivers-tesla-470 470.256.02-1~deb11u1
 CVE-2024-0092
@@ -150,10 +106,6 @@ CVE-2024-34083
 	[bullseye] - python-aiosmtpd 1.2.2-1+deb11u1
 CVE-2024-5742
 	[bullseye] - nano 5.4-2+deb11u3
-CVE-2024-35235
-	[bullseye] - cups 2.3.3op2-3+deb11u7
-CVE-2024-5629
-	[bullseye] - pymongo 3.11.0-1+deb11u1
 CVE-2023-51765
 	[bullseye] - sendmail 8.15.2-22+deb11u1
 CVE-2024-0090
@@ -164,6 +116,8 @@ CVE-2022-48622
 	[bullseye] - gdk-pixbuf 2.42.2+dfsg-1+deb11u2
 CVE-2024-XXXX [validate a server certificate in a TLS-based server-server connection]
 	[bullseye] - ngircd 26.1-1+deb11u1
+CVE-2023-50967
+	[bullseye] - jose 10-3+deb11u1
 CVE-2024-31755
 	[bullseye] - cjson 1.7.14-1+deb11u1
 CVE-2023-50471
@@ -176,5 +130,51 @@ CVE-2023-40305
 	[bullseye] - indent 2.2.12-1+deb11u1
 CVE-2024-0911
 	[bullseye] - indent 2.2.12-1+deb11u1
-CVE-2023-50967
-	[bullseye] - jose 10-3+deb11u1
+CVE-2021-32718
+	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-32719
+	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-22116
+	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2018-1279
+	[bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-3654
+	[bullseye] - nova 2:22.2.2-1+deb11u1
+CVE-2022-27240
+	[bullseye] - glewlwyd 2.5.2-2+deb11u3
+CVE-2022-29967
+	[bullseye] - glewlwyd 2.5.2-2+deb11u3
+CVE-2023-49208
+	[bullseye] - glewlwyd 2.5.2-2+deb11u3
+CVE-2021-24119
+	[bullseye] - mbedtls 2.16.12-0+deb11u1
+CVE-2021-44732
+	[bullseye] - mbedtls 2.16.12-0+deb11u1
+CVE-2022-32096
+	[bullseye] - rhonabwy 0.9.13-3+deb11u2
+CVE-2022-22995
+	[bullseye] - netatalk 3.1.12~ds-8+deb11u2
+CVE-2023-40546
+	[bullseye] - shim 15.8-1~deb11u1
+CVE-2023-40547
+	[bullseye] - shim 15.8-1~deb11u1
+CVE-2023-40548
+	[bullseye] - shim 15.8-1~deb11u1
+CVE-2023-40549
+	[bullseye] - shim 15.8-1~deb11u1
+CVE-2023-40550
+	[bullseye] - shim 15.8-1~deb11u1
+CVE-2023-40551
+	[bullseye] - shim 15.8-1~deb11u1
+CVE-2021-43784
+	[bullseye] - runc 1.0.0~rc93+ds1-5+deb11u4
+CVE-2023-27561
+	[bullseye] - runc 1.0.0~rc93+ds1-5+deb11u4
+CVE-2023-25809
+	[bullseye] - runc 1.0.0~rc93+ds1-5+deb11u4
+CVE-2023-28642
+	[bullseye] - runc 1.0.0~rc93+ds1-5+deb11u4
+CVE-2024-35235
+	[bullseye] - cups 2.3.3op2-3+deb11u7
+CVE-2024-5629
+	[bullseye] - pymongo 3.11.0-1+deb11u1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/450ad900d9b4f7c5de2f44c165a598a867f6687c

-- 
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/450ad900d9b4f7c5de2f44c165a598a867f6687c
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240628/cc1f1d31/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list