[Git][security-tracker-team/security-tracker][master] 6 commits: data/config.json: Update mapping release -> codenames
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sat Aug 9 10:09:27 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
ca3f4ec7 by Salvatore Bonaccorso at 2025-08-03T08:06:37+02:00
data/config.json: Update mapping release -> codenames
Make bullseye the oldoldstable distribution, bookworm the oldstable
distribution and trixie the new stable distribution.
Mark forky as the new testing distribution and sync supported
architecture lists for now with the cut-off as given for trixie.
Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>
- - - - -
dd8d2908 by Salvatore Bonaccorso at 2025-08-03T08:06:38+02:00
DSA.template: Add support for oldstable version information in DSA
Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>
(cherry picked from commit 60ee1a97c3a0ee1cab16b250222d7faa4578ced7)
Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>
- - - - -
fc9012bc by Salvatore Bonaccorso at 2025-08-03T08:06:38+02:00
List packages from oldstable and stable for dsa-needed list
Include in listing the oldstable distribution by enabling the boolean
value "include_oldstable" to true and so enabling the including logic
later on in the script.
Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>
(cherry picked from commit 1187d7c8638ffaf2dd7a4900122fb06882d5e65e)
Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>
- - - - -
1ed3e7a3 by Salvatore Bonaccorso at 2025-08-03T08:06:38+02:00
distributions.json: Mark trixie as supported by the Debian security team
Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>
- - - - -
4a68448e by Salvatore Bonaccorso at 2025-08-03T08:07:31+02:00
Move next-point-update.txt to next-oldstable-point-update.txt
All what is potentially pending for the next bookworm point release is
not to be considered for the next stable point update. Make an empty
list for trixie (stable).
Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>
- - - - -
37bb5e09 by Salvatore Bonaccorso at 2025-08-09T11:09:19+02:00
Merge branch 'trixie-release' into 'master'
Preparations for the security-tracker for the trixie release
See merge request security-tracker-team/security-tracker!213
- - - - -
6 changed files:
- bin/add-dsa-needed.sh
- data/config.json
- data/next-oldstable-point-update.txt
- data/next-point-update.txt
- doc/DSA.template
- static/distributions.json
Changes:
=====================================
bin/add-dsa-needed.sh
=====================================
@@ -20,7 +20,7 @@
set -eu
-include_oldstable=false
+include_oldstable=true
turl="https://security-tracker.debian.org/tracker/status/release"
[ -f data/dsa-needed.txt ] || {
=====================================
data/config.json
=====================================
@@ -93,7 +93,7 @@
]
},
"architectures": [ "amd64", "arm64", "armhf", "i386" ],
- "release": "oldstable"
+ "release": "oldoldstable"
},
"bookworm": {
"members": {
@@ -106,7 +106,7 @@
]
},
"architectures": [ "amd64", "arm64", "armel", "armhf", "i386", "mips64el", "mipsel", "ppc64el", "s390x" ],
- "release": "stable"
+ "release": "oldstable"
},
"trixie": {
"members": {
@@ -119,7 +119,7 @@
]
},
"architectures": [ "amd64", "arm64", "armel", "armhf", "i386", "ppc64el", "riscv64", "s390x" ],
- "release": "testing"
+ "release": "stable"
},
"forky": {
"members": {
@@ -130,7 +130,9 @@
"optional": [
"forky-proposed-updates"
]
- }
+ },
+ "architectures": [ "amd64", "arm64", "armel", "armhf", "i386", "ppc64el", "riscv64", "s390x" ],
+ "release": "testing"
},
"duke": {
"members": {
=====================================
data/next-oldstable-point-update.txt
=====================================
@@ -1,10 +1,284 @@
-CVE-2021-3654
- [bullseye] - nova 2:22.2.2-1+deb11u1
-CVE-2021-24119
- [bullseye] - mbedtls 2.16.12-0+deb11u1
-CVE-2021-44732
- [bullseye] - mbedtls 2.16.12-0+deb11u1
-CVE-2022-22995
- [bullseye] - netatalk 3.1.12~ds-8+deb11u2
-CVE-2024-5629
- [bullseye] - pymongo 3.11.0-1+deb11u1
+CVE-2025-46712
+ [bookworm] - erlang 1:25.2.3+dfsg-1+deb12u2
+CVE-2025-4748
+ [bookworm] - erlang 1:25.2.3+dfsg-1+deb12u2
+CVE-2025-46397
+ [bookworm] - fig2dev 1:3.2.8b-3+deb12u2
+CVE-2025-46398
+ [bookworm] - fig2dev 1:3.2.8b-3+deb12u2
+CVE-2025-46399
+ [bookworm] - fig2dev 1:3.2.8b-3+deb12u2
+CVE-2025-46400
+ [bookworm] - fig2dev 1:3.2.8b-3+deb12u2
+CVE-2024-39329
+ [bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-39330
+ [bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-39614
+ [bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-41989
+ [bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-41991
+ [bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-42005
+ [bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2023-39350
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-39351
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-39352
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-39353
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-39354
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-39356
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-40181
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-40186
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-40188
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-40567
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-40569
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-40589
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-22211
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32039
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32040
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32041
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32458
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32459
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32460
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32658
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32659
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32660
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32661
+ [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-45234
+ [bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45235
+ [bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45236
+ [bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45237
+ [bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45238
+ [bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45239
+ [bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-48943
+ [bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2022-37660
+ [bookworm] - wpa 2:2.10-12+deb12u3
+CVE-2023-52425
+ [bookworm] - expat 2.5.0-1+deb12u2
+CVE-2024-50602
+ [bookworm] - expat 2.5.0-1+deb12u2
+CVE-2024-8176
+ [bookworm] - expat 2.5.0-1+deb12u2
+CVE-2024-8376
+ [bookworm] - mosquitto 2.0.11-1.2+deb12u2
+CVE-2024-3935
+ [bookworm] - mosquitto 2.0.11-1.2+deb12u2
+CVE-2024-10525
+ [bookworm] - mosquitto 2.0.11-1.2+deb12u2
+CVE-2025-27221
+ [bookworm] - rubygems 3.3.15-2+deb12u1
+CVE-2023-28755
+ [bookworm] - rubygems 3.3.15-2+deb12u1
+CVE-2025-32776
+ [bookworm] - openrazer 3.5.1+dfsg-2+deb12u1
+CVE-2025-46337
+ [bookworm] - libphp-adodb 5.21.4-1+deb12u1
+CVE-2023-52969
+ [bookworm] - mariadb 1:10.11.13-0+deb12u1
+CVE-2023-52970
+ [bookworm] - mariadb 1:10.11.13-0+deb12u1
+CVE-2023-52971
+ [bookworm] - mariadb 1:10.11.13-0+deb12u1
+CVE-2025-30693
+ [bookworm] - mariadb 1:10.11.13-0+deb12u1
+CVE-2025-30722
+ [bookworm] - mariadb 1:10.11.13-0+deb12u1
+CVE-2025-3576
+ [bookworm] - krb5 1.20.1-2+deb12u4
+CVE-2025-27773
+ [bookworm] - simplesamlphp 1.19.7-1+deb12u2
+CVE-2025-47203
+ [bookworm] - dropbear 2022.83-1+deb12u3
+CVE-2024-57823
+ [bookworm] - raptor2 2.0.15-4+deb12u1
+CVE-2024-57822
+ [bookworm] - raptor2 2.0.15-4+deb12u1
+CVE-2024-5569
+ [bookworm] - python-zipp 1.0.0-6+deb12u1
+CVE-2025-27516
+ [bookworm] - jinja2 3.1.2-1+deb12u3
+CVE-2025-43961
+ [bookworm] - libraw 0.20.2-2.1+deb12u1
+CVE-2025-43962
+ [bookworm] - libraw 0.20.2-2.1+deb12u1
+CVE-2025-43963
+ [bookworm] - libraw 0.20.2-2.1+deb12u1
+CVE-2025-43964
+ [bookworm] - libraw 0.20.2-2.1+deb12u1
+CVE-2025-47273
+ [bookworm] - setuptools 66.1.1-1+deb12u2
+CVE-2025-4802
+ [bookworm] - glibc 2.36-9+deb12u11
+CVE-2025-30224
+ [bookworm] - mydumper 0.10.1-1+deb12u2
+CVE-2025-3818
+ [bookworm] - webpy 1:0.62-4+deb12u1
+CVE-2025-40908
+ [bookworm] - libyaml-libyaml-perl 0.86+ds-1+deb12u1
+CVE-2024-50624
+ [bookworm] - kmail-account-wizard 4:22.12.3-1+deb12u1
+CVE-2025-1647
+ [bookworm] - twitter-bootstrap3 3.4.1+dfsg-3+deb12u2
+CVE-2025-30472
+ [bookworm] - corosync 3.1.7-1+deb12u1
+CVE-2024-12905
+ [bookworm] - node-tar-fs 2.1.3-0+deb12u1
+CVE-2025-48387
+ [bookworm] - node-tar-fs 2.1.3-0+deb12u1
+CVE-2025-4215
+ [bookworm] - ublock-origin 1.62.0+dfsg-0+deb12u1
+CVE-2023-26819
+ [bookworm] - cjson 1.7.15-1+deb12u3
+CVE-2023-53154
+ [bookworm] - cjson 1.7.15-1+deb12u3
+CVE-2024-56161
+ [bookworm] - amd64-microcode 3.20250311.1~deb12u1
+CVE-2024-1681
+ [bookworm] - python-flask-cors 3.0.10-2+deb12u1
+CVE-2024-6866
+ [bookworm] - python-flask-cors 3.0.10-2+deb12u1
+CVE-2024-6839
+ [bookworm] - python-flask-cors 3.0.10-2+deb12u1
+CVE-2024-6844
+ [bookworm] - python-flask-cors 3.0.10-2+deb12u1
+CVE-2023-28755
+ [bookworm] - ruby3.1 3.1.7-1~deb12u1
+CVE-2023-28756
+ [bookworm] - ruby3.1 3.1.7-1~deb12u1
+CVE-2024-27282
+ [bookworm] - ruby3.1 3.1.7-1~deb12u1
+CVE-2024-27281
+ [bookworm] - ruby3.1 3.1.7-1~deb12u1
+CVE-2024-27280
+ [bookworm] - ruby3.1 3.1.7-1~deb12u1
+CVE-2025-27219
+ [bookworm] - ruby3.1 3.1.7-1~deb12u1
+CVE-2025-27220
+ [bookworm] - ruby3.1 3.1.7-1~deb12u1
+CVE-2025-27221
+ [bookworm] - ruby3.1 3.1.7-1~deb12u1
+CVE-2025-20128
+ [bookworm] - clamav 1.0.9+dfsg-1~deb12u1
+CVE-2025-20260
+ [bookworm] - clamav 1.0.9+dfsg-1~deb12u1
+CVE-2024-33899
+ [bookworm] - rar 2:7.01-1~deb12u1
+CVE-2021-25743
+ [bookworm] - kubernetes 1.20.5+really1.20.2-1.1
+CVE-2025-48060
+ [bookworm] - jq 1.6-2.1+deb12u1
+CVE-2024-6174
+ [bookworm] - cloud-init 22.4.2-1+deb12u3
+CVE-2024-11584
+ [bookworm] - cloud-init 22.4.2-1+deb12u3
+CVE-2024-52530
+ [bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2024-52531
+ [bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2024-52532
+ [bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-32050
+ [bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-32051
+ [bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-32052
+ [bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-32053
+ [bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-2784
+ [bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-32909
+ [bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-32910
+ [bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-32911
+ [bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-46420
+ [bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-32912
+ [bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-32906
+ [bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-46421
+ [bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2022-25844
+ [bookworm] - angular.js 1.8.3-1+deb12u1
+CVE-2023-26116
+ [bookworm] - angular.js 1.8.3-1+deb12u1
+CVE-2023-26117
+ [bookworm] - angular.js 1.8.3-1+deb12u1
+CVE-2023-26118
+ [bookworm] - angular.js 1.8.3-1+deb12u1
+CVE-2024-8372
+ [bookworm] - angular.js 1.8.3-1+deb12u1
+CVE-2024-8373
+ [bookworm] - angular.js 1.8.3-1+deb12u1
+CVE-2024-21490
+ [bookworm] - angular.js 1.8.3-1+deb12u1
+CVE-2025-0716
+ [bookworm] - angular.js 1.8.3-1+deb12u1
+CVE-2025-2336
+ [bookworm] - angular.js 1.8.3-1+deb12u1
+CVE-2025-27553
+ [bookworm] - commons-vfs 2.1-4+deb12u1
+CVE-2021-46310
+ [bookworm] - djvulibre 3.5.28-2.2~deb12u1
+CVE-2021-46312
+ [bookworm] - djvulibre 3.5.28-2.2~deb12u1
+CVE-2025-8058
+ [bookworm] - glibc 2.36-9+deb12u13
+CVE-2025-6021
+ [bookworm] - libxml2 2.9.14+dfsg-1.3~deb12u3
+CVE-2025-6170
+ [bookworm] - libxml2 2.9.14+dfsg-1.3~deb12u3
+CVE-2025-49794
+ [bookworm] - libxml2 2.9.14+dfsg-1.3~deb12u3
+CVE-2025-49796
+ [bookworm] - libxml2 2.9.14+dfsg-1.3~deb12u3
+CVE-2024-42516
+ [bookworm] - apache2 2.4.65-1~deb12u1
+CVE-2024-43204
+ [bookworm] - apache2 2.4.65-1~deb12u1
+CVE-2024-47252
+ [bookworm] - apache2 2.4.65-1~deb12u1
+CVE-2025-23048
+ [bookworm] - apache2 2.4.65-1~deb12u1
+CVE-2025-49630
+ [bookworm] - apache2 2.4.65-1~deb12u1
+CVE-2025-49812
+ [bookworm] - apache2 2.4.65-1~deb12u1
+CVE-2025-53020
+ [bookworm] - apache2 2.4.65-1~deb12u1
+CVE-2025-7783
+ [bookworm] - node-form-data 4.0.1-1+deb12u1
=====================================
data/next-point-update.txt
=====================================
@@ -1,284 +0,0 @@
-CVE-2025-46712
- [bookworm] - erlang 1:25.2.3+dfsg-1+deb12u2
-CVE-2025-4748
- [bookworm] - erlang 1:25.2.3+dfsg-1+deb12u2
-CVE-2025-46397
- [bookworm] - fig2dev 1:3.2.8b-3+deb12u2
-CVE-2025-46398
- [bookworm] - fig2dev 1:3.2.8b-3+deb12u2
-CVE-2025-46399
- [bookworm] - fig2dev 1:3.2.8b-3+deb12u2
-CVE-2025-46400
- [bookworm] - fig2dev 1:3.2.8b-3+deb12u2
-CVE-2024-39329
- [bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-39330
- [bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-39614
- [bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-41989
- [bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-41991
- [bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-42005
- [bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2023-39350
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-39351
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-39352
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-39353
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-39354
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-39356
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-40181
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-40186
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-40188
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-40567
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-40569
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-40589
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-22211
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32039
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32040
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32041
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32458
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32459
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32460
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32658
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32659
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32660
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32661
- [bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-45234
- [bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45235
- [bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45236
- [bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45237
- [bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45238
- [bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45239
- [bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-48943
- [bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2022-37660
- [bookworm] - wpa 2:2.10-12+deb12u3
-CVE-2023-52425
- [bookworm] - expat 2.5.0-1+deb12u2
-CVE-2024-50602
- [bookworm] - expat 2.5.0-1+deb12u2
-CVE-2024-8176
- [bookworm] - expat 2.5.0-1+deb12u2
-CVE-2024-8376
- [bookworm] - mosquitto 2.0.11-1.2+deb12u2
-CVE-2024-3935
- [bookworm] - mosquitto 2.0.11-1.2+deb12u2
-CVE-2024-10525
- [bookworm] - mosquitto 2.0.11-1.2+deb12u2
-CVE-2025-27221
- [bookworm] - rubygems 3.3.15-2+deb12u1
-CVE-2023-28755
- [bookworm] - rubygems 3.3.15-2+deb12u1
-CVE-2025-32776
- [bookworm] - openrazer 3.5.1+dfsg-2+deb12u1
-CVE-2025-46337
- [bookworm] - libphp-adodb 5.21.4-1+deb12u1
-CVE-2023-52969
- [bookworm] - mariadb 1:10.11.13-0+deb12u1
-CVE-2023-52970
- [bookworm] - mariadb 1:10.11.13-0+deb12u1
-CVE-2023-52971
- [bookworm] - mariadb 1:10.11.13-0+deb12u1
-CVE-2025-30693
- [bookworm] - mariadb 1:10.11.13-0+deb12u1
-CVE-2025-30722
- [bookworm] - mariadb 1:10.11.13-0+deb12u1
-CVE-2025-3576
- [bookworm] - krb5 1.20.1-2+deb12u4
-CVE-2025-27773
- [bookworm] - simplesamlphp 1.19.7-1+deb12u2
-CVE-2025-47203
- [bookworm] - dropbear 2022.83-1+deb12u3
-CVE-2024-57823
- [bookworm] - raptor2 2.0.15-4+deb12u1
-CVE-2024-57822
- [bookworm] - raptor2 2.0.15-4+deb12u1
-CVE-2024-5569
- [bookworm] - python-zipp 1.0.0-6+deb12u1
-CVE-2025-27516
- [bookworm] - jinja2 3.1.2-1+deb12u3
-CVE-2025-43961
- [bookworm] - libraw 0.20.2-2.1+deb12u1
-CVE-2025-43962
- [bookworm] - libraw 0.20.2-2.1+deb12u1
-CVE-2025-43963
- [bookworm] - libraw 0.20.2-2.1+deb12u1
-CVE-2025-43964
- [bookworm] - libraw 0.20.2-2.1+deb12u1
-CVE-2025-47273
- [bookworm] - setuptools 66.1.1-1+deb12u2
-CVE-2025-4802
- [bookworm] - glibc 2.36-9+deb12u11
-CVE-2025-30224
- [bookworm] - mydumper 0.10.1-1+deb12u2
-CVE-2025-3818
- [bookworm] - webpy 1:0.62-4+deb12u1
-CVE-2025-40908
- [bookworm] - libyaml-libyaml-perl 0.86+ds-1+deb12u1
-CVE-2024-50624
- [bookworm] - kmail-account-wizard 4:22.12.3-1+deb12u1
-CVE-2025-1647
- [bookworm] - twitter-bootstrap3 3.4.1+dfsg-3+deb12u2
-CVE-2025-30472
- [bookworm] - corosync 3.1.7-1+deb12u1
-CVE-2024-12905
- [bookworm] - node-tar-fs 2.1.3-0+deb12u1
-CVE-2025-48387
- [bookworm] - node-tar-fs 2.1.3-0+deb12u1
-CVE-2025-4215
- [bookworm] - ublock-origin 1.62.0+dfsg-0+deb12u1
-CVE-2023-26819
- [bookworm] - cjson 1.7.15-1+deb12u3
-CVE-2023-53154
- [bookworm] - cjson 1.7.15-1+deb12u3
-CVE-2024-56161
- [bookworm] - amd64-microcode 3.20250311.1~deb12u1
-CVE-2024-1681
- [bookworm] - python-flask-cors 3.0.10-2+deb12u1
-CVE-2024-6866
- [bookworm] - python-flask-cors 3.0.10-2+deb12u1
-CVE-2024-6839
- [bookworm] - python-flask-cors 3.0.10-2+deb12u1
-CVE-2024-6844
- [bookworm] - python-flask-cors 3.0.10-2+deb12u1
-CVE-2023-28755
- [bookworm] - ruby3.1 3.1.7-1~deb12u1
-CVE-2023-28756
- [bookworm] - ruby3.1 3.1.7-1~deb12u1
-CVE-2024-27282
- [bookworm] - ruby3.1 3.1.7-1~deb12u1
-CVE-2024-27281
- [bookworm] - ruby3.1 3.1.7-1~deb12u1
-CVE-2024-27280
- [bookworm] - ruby3.1 3.1.7-1~deb12u1
-CVE-2025-27219
- [bookworm] - ruby3.1 3.1.7-1~deb12u1
-CVE-2025-27220
- [bookworm] - ruby3.1 3.1.7-1~deb12u1
-CVE-2025-27221
- [bookworm] - ruby3.1 3.1.7-1~deb12u1
-CVE-2025-20128
- [bookworm] - clamav 1.0.9+dfsg-1~deb12u1
-CVE-2025-20260
- [bookworm] - clamav 1.0.9+dfsg-1~deb12u1
-CVE-2024-33899
- [bookworm] - rar 2:7.01-1~deb12u1
-CVE-2021-25743
- [bookworm] - kubernetes 1.20.5+really1.20.2-1.1
-CVE-2025-48060
- [bookworm] - jq 1.6-2.1+deb12u1
-CVE-2024-6174
- [bookworm] - cloud-init 22.4.2-1+deb12u3
-CVE-2024-11584
- [bookworm] - cloud-init 22.4.2-1+deb12u3
-CVE-2024-52530
- [bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2024-52531
- [bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2024-52532
- [bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-32050
- [bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-32051
- [bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-32052
- [bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-32053
- [bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-2784
- [bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-32909
- [bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-32910
- [bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-32911
- [bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-46420
- [bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-32912
- [bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-32906
- [bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-46421
- [bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2022-25844
- [bookworm] - angular.js 1.8.3-1+deb12u1
-CVE-2023-26116
- [bookworm] - angular.js 1.8.3-1+deb12u1
-CVE-2023-26117
- [bookworm] - angular.js 1.8.3-1+deb12u1
-CVE-2023-26118
- [bookworm] - angular.js 1.8.3-1+deb12u1
-CVE-2024-8372
- [bookworm] - angular.js 1.8.3-1+deb12u1
-CVE-2024-8373
- [bookworm] - angular.js 1.8.3-1+deb12u1
-CVE-2024-21490
- [bookworm] - angular.js 1.8.3-1+deb12u1
-CVE-2025-0716
- [bookworm] - angular.js 1.8.3-1+deb12u1
-CVE-2025-2336
- [bookworm] - angular.js 1.8.3-1+deb12u1
-CVE-2025-27553
- [bookworm] - commons-vfs 2.1-4+deb12u1
-CVE-2021-46310
- [bookworm] - djvulibre 3.5.28-2.2~deb12u1
-CVE-2021-46312
- [bookworm] - djvulibre 3.5.28-2.2~deb12u1
-CVE-2025-8058
- [bookworm] - glibc 2.36-9+deb12u13
-CVE-2025-6021
- [bookworm] - libxml2 2.9.14+dfsg-1.3~deb12u3
-CVE-2025-6170
- [bookworm] - libxml2 2.9.14+dfsg-1.3~deb12u3
-CVE-2025-49794
- [bookworm] - libxml2 2.9.14+dfsg-1.3~deb12u3
-CVE-2025-49796
- [bookworm] - libxml2 2.9.14+dfsg-1.3~deb12u3
-CVE-2024-42516
- [bookworm] - apache2 2.4.65-1~deb12u1
-CVE-2024-43204
- [bookworm] - apache2 2.4.65-1~deb12u1
-CVE-2024-47252
- [bookworm] - apache2 2.4.65-1~deb12u1
-CVE-2025-23048
- [bookworm] - apache2 2.4.65-1~deb12u1
-CVE-2025-49630
- [bookworm] - apache2 2.4.65-1~deb12u1
-CVE-2025-49812
- [bookworm] - apache2 2.4.65-1~deb12u1
-CVE-2025-53020
- [bookworm] - apache2 2.4.65-1~deb12u1
-CVE-2025-7783
- [bookworm] - node-form-data 4.0.1-1+deb12u1
=====================================
doc/DSA.template
=====================================
@@ -14,6 +14,9 @@ Debian Bug : $BUGNUM
$TEXT
+For the oldstable distribution ($OLDSTABLE), this problem has been fixed
+in version $$OLDSTABLE_VERSION.
+
For the stable distribution ($STABLE), this problem has been fixed in
version $$STABLE_VERSION.
=====================================
static/distributions.json
=====================================
@@ -31,8 +31,8 @@
},
"trixie": {
"major-version": "13",
- "support": "none",
- "contact": ""
+ "support": "security",
+ "contact": "team at security.debian.org"
},
"forky": {
"major-version": "14",
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/7506d4bff92464368b344030d234d042e45ffbfc...37bb5e0917fd58fc6f2d8e6bc179c2db6e66d37e
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/7506d4bff92464368b344030d234d042e45ffbfc...37bb5e0917fd58fc6f2d8e6bc179c2db6e66d37e
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250809/b31fce23/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list