[Git][security-tracker-team/security-tracker][master] Review list of bullseye-pu updates (likely) accepted in 11.10
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Fri Jun 28 22:10:24 BST 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
450ad900 by Salvatore Bonaccorso at 2024-06-28T23:09:25+02:00
Review list of bullseye-pu updates (likely) accepted in 11.10
- - - - -
1 changed file:
- data/next-oldstable-point-update.txt
Changes:
=====================================
data/next-oldstable-point-update.txt
=====================================
@@ -1,27 +1,5 @@
CVE-2023-5157
- [bullseye] - galera-4 26.4.14-0+deb11u1
-CVE-2021-32718
- [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-32719
- [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-22116
- [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2018-1279
- [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-3654
- [bullseye] - nova 2:22.2.2-1+deb11u1
-CVE-2022-27240
- [bullseye] - glewlwyd 2.5.2-2+deb11u3
-CVE-2022-29967
- [bullseye] - glewlwyd 2.5.2-2+deb11u3
-CVE-2023-49208
- [bullseye] - glewlwyd 2.5.2-2+deb11u3
-CVE-2021-24119
- [bullseye] - mbedtls 2.16.12-0+deb11u1
-CVE-2021-44732
- [bullseye] - mbedtls 2.16.12-0+deb11u1
-CVE-2022-32096
- [bullseye] - rhonabwy 0.9.13-3+deb11u2
+ [bullseye] - galera-4 26.4.18-0+deb11u1
CVE-2022-2996
[bullseye] - python-scciclient 0.8.0-2+deb11u1
CVE-2022-24859
@@ -30,8 +8,6 @@ CVE-2023-36810
[bullseye] - pypdf2 1.26.0-4+deb11u1
CVE-2020-22218
[bullseye] - libssh2 1.9.0-2+deb11u1
-CVE-2022-22995
- [bullseye] - netatalk 3.1.12~ds-8+deb11u2
CVE-2022-22846
[bullseye] - python-dnslib 0.9.14-1+deb11u1
CVE-2024-25189
@@ -110,18 +86,6 @@ CVE-2023-33285
[bullseye] - qtbase-opensource-src 5.15.2+dfsg-9+deb11u1
CVE-2023-52160
[bullseye] - wpa 2:2.9.0-21+deb11u1
-CVE-2023-40546
- [bullseye] - shim 15.8-1~deb11u1
-CVE-2023-40547
- [bullseye] - shim 15.8-1~deb11u1
-CVE-2023-40548
- [bullseye] - shim 15.8-1~deb11u1
-CVE-2023-40549
- [bullseye] - shim 15.8-1~deb11u1
-CVE-2023-40550
- [bullseye] - shim 15.8-1~deb11u1
-CVE-2023-40551
- [bullseye] - shim 15.8-1~deb11u1
CVE-2023-47855
[bullseye] - intel-microcode 3.20240514.1~deb11u1
CVE-2023-45745
@@ -130,14 +94,6 @@ CVE-2023-46103
[bullseye] - intel-microcode 3.20240514.1~deb11u1
CVE-2023-45733
[bullseye] - intel-microcode 3.20240514.1~deb11u1
-CVE-2021-43784
- [bullseye] - runc 1.0.0~rc93+ds1-5+deb11u4
-CVE-2023-27561
- [bullseye] - runc 1.0.0~rc93+ds1-5+deb11u4
-CVE-2023-25809
- [bullseye] - runc 1.0.0~rc93+ds1-5+deb11u4
-CVE-2023-28642
- [bullseye] - runc 1.0.0~rc93+ds1-5+deb11u4
CVE-2024-0090
[bullseye] - nvidia-graphics-drivers-tesla-470 470.256.02-1~deb11u1
CVE-2024-0092
@@ -150,10 +106,6 @@ CVE-2024-34083
[bullseye] - python-aiosmtpd 1.2.2-1+deb11u1
CVE-2024-5742
[bullseye] - nano 5.4-2+deb11u3
-CVE-2024-35235
- [bullseye] - cups 2.3.3op2-3+deb11u7
-CVE-2024-5629
- [bullseye] - pymongo 3.11.0-1+deb11u1
CVE-2023-51765
[bullseye] - sendmail 8.15.2-22+deb11u1
CVE-2024-0090
@@ -164,6 +116,8 @@ CVE-2022-48622
[bullseye] - gdk-pixbuf 2.42.2+dfsg-1+deb11u2
CVE-2024-XXXX [validate a server certificate in a TLS-based server-server connection]
[bullseye] - ngircd 26.1-1+deb11u1
+CVE-2023-50967
+ [bullseye] - jose 10-3+deb11u1
CVE-2024-31755
[bullseye] - cjson 1.7.14-1+deb11u1
CVE-2023-50471
@@ -176,5 +130,51 @@ CVE-2023-40305
[bullseye] - indent 2.2.12-1+deb11u1
CVE-2024-0911
[bullseye] - indent 2.2.12-1+deb11u1
-CVE-2023-50967
- [bullseye] - jose 10-3+deb11u1
+CVE-2021-32718
+ [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-32719
+ [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-22116
+ [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2018-1279
+ [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-3654
+ [bullseye] - nova 2:22.2.2-1+deb11u1
+CVE-2022-27240
+ [bullseye] - glewlwyd 2.5.2-2+deb11u3
+CVE-2022-29967
+ [bullseye] - glewlwyd 2.5.2-2+deb11u3
+CVE-2023-49208
+ [bullseye] - glewlwyd 2.5.2-2+deb11u3
+CVE-2021-24119
+ [bullseye] - mbedtls 2.16.12-0+deb11u1
+CVE-2021-44732
+ [bullseye] - mbedtls 2.16.12-0+deb11u1
+CVE-2022-32096
+ [bullseye] - rhonabwy 0.9.13-3+deb11u2
+CVE-2022-22995
+ [bullseye] - netatalk 3.1.12~ds-8+deb11u2
+CVE-2023-40546
+ [bullseye] - shim 15.8-1~deb11u1
+CVE-2023-40547
+ [bullseye] - shim 15.8-1~deb11u1
+CVE-2023-40548
+ [bullseye] - shim 15.8-1~deb11u1
+CVE-2023-40549
+ [bullseye] - shim 15.8-1~deb11u1
+CVE-2023-40550
+ [bullseye] - shim 15.8-1~deb11u1
+CVE-2023-40551
+ [bullseye] - shim 15.8-1~deb11u1
+CVE-2021-43784
+ [bullseye] - runc 1.0.0~rc93+ds1-5+deb11u4
+CVE-2023-27561
+ [bullseye] - runc 1.0.0~rc93+ds1-5+deb11u4
+CVE-2023-25809
+ [bullseye] - runc 1.0.0~rc93+ds1-5+deb11u4
+CVE-2023-28642
+ [bullseye] - runc 1.0.0~rc93+ds1-5+deb11u4
+CVE-2024-35235
+ [bullseye] - cups 2.3.3op2-3+deb11u7
+CVE-2024-5629
+ [bullseye] - pymongo 3.11.0-1+deb11u1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/450ad900d9b4f7c5de2f44c165a598a867f6687c
--
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/450ad900d9b4f7c5de2f44c165a598a867f6687c
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240628/cc1f1d31/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list