[Git][security-tracker-team/security-tracker][master] 6 commits: data/config.json: Update mapping release -> codenames

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sat Aug 9 10:09:27 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ca3f4ec7 by Salvatore Bonaccorso at 2025-08-03T08:06:37+02:00
data/config.json: Update mapping release -> codenames

Make bullseye the oldoldstable distribution, bookworm the oldstable
distribution and trixie the new stable distribution.

Mark forky as the new testing distribution and sync supported
architecture lists for now with the cut-off as given for trixie.

Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>

- - - - -
dd8d2908 by Salvatore Bonaccorso at 2025-08-03T08:06:38+02:00
DSA.template: Add support for oldstable version information in DSA

Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>
(cherry picked from commit 60ee1a97c3a0ee1cab16b250222d7faa4578ced7)
Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>

- - - - -
fc9012bc by Salvatore Bonaccorso at 2025-08-03T08:06:38+02:00
List packages from oldstable and stable for dsa-needed list

Include in listing the oldstable distribution by enabling the boolean
value "include_oldstable" to true and so enabling the including logic
later on in the script.

Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>
(cherry picked from commit 1187d7c8638ffaf2dd7a4900122fb06882d5e65e)
Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>

- - - - -
1ed3e7a3 by Salvatore Bonaccorso at 2025-08-03T08:06:38+02:00
distributions.json: Mark trixie as supported by the Debian security team

Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>

- - - - -
4a68448e by Salvatore Bonaccorso at 2025-08-03T08:07:31+02:00
Move next-point-update.txt to next-oldstable-point-update.txt

All what is potentially pending for the next bookworm point release is
not to be considered for the next stable point update. Make an empty
list for trixie (stable).

Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>

- - - - -
37bb5e09 by Salvatore Bonaccorso at 2025-08-09T11:09:19+02:00
Merge branch 'trixie-release' into 'master'

Preparations for the security-tracker for the trixie release

See merge request security-tracker-team/security-tracker!213
- - - - -


6 changed files:

- bin/add-dsa-needed.sh
- data/config.json
- data/next-oldstable-point-update.txt
- data/next-point-update.txt
- doc/DSA.template
- static/distributions.json


Changes:

=====================================
bin/add-dsa-needed.sh
=====================================
@@ -20,7 +20,7 @@
 
 set -eu
 
-include_oldstable=false
+include_oldstable=true
 turl="https://security-tracker.debian.org/tracker/status/release"
 
 [ -f data/dsa-needed.txt ] || {


=====================================
data/config.json
=====================================
@@ -93,7 +93,7 @@
         ]
       },
       "architectures": [ "amd64", "arm64", "armhf", "i386" ],
-      "release": "oldstable"
+      "release": "oldoldstable"
     },
     "bookworm": {
       "members": {
@@ -106,7 +106,7 @@
         ]
       },
       "architectures": [ "amd64", "arm64", "armel", "armhf", "i386", "mips64el", "mipsel", "ppc64el", "s390x" ],
-      "release": "stable"
+      "release": "oldstable"
     },
     "trixie": {
       "members": {
@@ -119,7 +119,7 @@
         ]
       },
       "architectures": [ "amd64", "arm64", "armel", "armhf", "i386", "ppc64el", "riscv64", "s390x" ],
-      "release": "testing"
+      "release": "stable"
     },
     "forky": {
       "members": {
@@ -130,7 +130,9 @@
         "optional": [
           "forky-proposed-updates"
         ]
-      }
+      },
+      "architectures": [ "amd64", "arm64", "armel", "armhf", "i386", "ppc64el", "riscv64", "s390x" ],
+      "release": "testing"
     },
     "duke": {
       "members": {


=====================================
data/next-oldstable-point-update.txt
=====================================
@@ -1,10 +1,284 @@
-CVE-2021-3654
-	[bullseye] - nova 2:22.2.2-1+deb11u1
-CVE-2021-24119
-	[bullseye] - mbedtls 2.16.12-0+deb11u1
-CVE-2021-44732
-	[bullseye] - mbedtls 2.16.12-0+deb11u1
-CVE-2022-22995
-	[bullseye] - netatalk 3.1.12~ds-8+deb11u2
-CVE-2024-5629
-	[bullseye] - pymongo 3.11.0-1+deb11u1
+CVE-2025-46712
+	[bookworm] - erlang 1:25.2.3+dfsg-1+deb12u2
+CVE-2025-4748
+	[bookworm] - erlang 1:25.2.3+dfsg-1+deb12u2
+CVE-2025-46397
+	[bookworm] - fig2dev 1:3.2.8b-3+deb12u2
+CVE-2025-46398
+	[bookworm] - fig2dev 1:3.2.8b-3+deb12u2
+CVE-2025-46399
+	[bookworm] - fig2dev 1:3.2.8b-3+deb12u2
+CVE-2025-46400
+	[bookworm] - fig2dev 1:3.2.8b-3+deb12u2
+CVE-2024-39329
+	[bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-39330
+	[bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-39614
+	[bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-41989
+	[bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-41991
+	[bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-42005
+	[bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2023-39350
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-39351
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-39352
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-39353
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-39354
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-39356
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-40181
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-40186
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-40188
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-40567
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-40569
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2023-40589
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-22211
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32039
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32040
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32041
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32458
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32459
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32460
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32658
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32659
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32660
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-32661
+	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
+CVE-2024-45234
+	[bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45235
+	[bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45236
+	[bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45237
+	[bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45238
+	[bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45239
+	[bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-48943
+	[bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2022-37660
+	[bookworm] - wpa 2:2.10-12+deb12u3
+CVE-2023-52425
+	[bookworm] - expat 2.5.0-1+deb12u2
+CVE-2024-50602
+	[bookworm] - expat 2.5.0-1+deb12u2
+CVE-2024-8176
+	[bookworm] - expat 2.5.0-1+deb12u2
+CVE-2024-8376
+	[bookworm] - mosquitto 2.0.11-1.2+deb12u2
+CVE-2024-3935
+	[bookworm] - mosquitto 2.0.11-1.2+deb12u2
+CVE-2024-10525
+	[bookworm] - mosquitto 2.0.11-1.2+deb12u2
+CVE-2025-27221
+	[bookworm] - rubygems 3.3.15-2+deb12u1
+CVE-2023-28755
+	[bookworm] - rubygems 3.3.15-2+deb12u1
+CVE-2025-32776
+	[bookworm] - openrazer 3.5.1+dfsg-2+deb12u1
+CVE-2025-46337
+	[bookworm] - libphp-adodb 5.21.4-1+deb12u1
+CVE-2023-52969
+	[bookworm] - mariadb 1:10.11.13-0+deb12u1
+CVE-2023-52970
+	[bookworm] - mariadb 1:10.11.13-0+deb12u1
+CVE-2023-52971
+	[bookworm] - mariadb 1:10.11.13-0+deb12u1
+CVE-2025-30693
+	[bookworm] - mariadb 1:10.11.13-0+deb12u1
+CVE-2025-30722
+	[bookworm] - mariadb 1:10.11.13-0+deb12u1
+CVE-2025-3576
+	[bookworm] - krb5 1.20.1-2+deb12u4
+CVE-2025-27773
+	[bookworm] - simplesamlphp 1.19.7-1+deb12u2
+CVE-2025-47203
+	[bookworm] - dropbear 2022.83-1+deb12u3
+CVE-2024-57823
+	[bookworm] - raptor2 2.0.15-4+deb12u1
+CVE-2024-57822
+	[bookworm] - raptor2 2.0.15-4+deb12u1
+CVE-2024-5569
+	[bookworm] - python-zipp 1.0.0-6+deb12u1
+CVE-2025-27516
+	[bookworm] - jinja2 3.1.2-1+deb12u3
+CVE-2025-43961
+	[bookworm] - libraw 0.20.2-2.1+deb12u1
+CVE-2025-43962
+	[bookworm] - libraw 0.20.2-2.1+deb12u1
+CVE-2025-43963
+	[bookworm] - libraw 0.20.2-2.1+deb12u1
+CVE-2025-43964
+	[bookworm] - libraw 0.20.2-2.1+deb12u1
+CVE-2025-47273
+	[bookworm] - setuptools 66.1.1-1+deb12u2
+CVE-2025-4802
+	[bookworm] - glibc 2.36-9+deb12u11
+CVE-2025-30224
+	[bookworm] - mydumper 0.10.1-1+deb12u2
+CVE-2025-3818
+	[bookworm] - webpy 1:0.62-4+deb12u1
+CVE-2025-40908
+	[bookworm] - libyaml-libyaml-perl 0.86+ds-1+deb12u1
+CVE-2024-50624
+	[bookworm] - kmail-account-wizard 4:22.12.3-1+deb12u1
+CVE-2025-1647
+	[bookworm] - twitter-bootstrap3 3.4.1+dfsg-3+deb12u2
+CVE-2025-30472
+	[bookworm] - corosync 3.1.7-1+deb12u1
+CVE-2024-12905
+	[bookworm] - node-tar-fs 2.1.3-0+deb12u1
+CVE-2025-48387
+	[bookworm] - node-tar-fs 2.1.3-0+deb12u1
+CVE-2025-4215
+	[bookworm] - ublock-origin 1.62.0+dfsg-0+deb12u1
+CVE-2023-26819
+	[bookworm] - cjson 1.7.15-1+deb12u3
+CVE-2023-53154
+	[bookworm] - cjson 1.7.15-1+deb12u3
+CVE-2024-56161
+	[bookworm] - amd64-microcode 3.20250311.1~deb12u1
+CVE-2024-1681
+	[bookworm] - python-flask-cors 3.0.10-2+deb12u1
+CVE-2024-6866
+	[bookworm] - python-flask-cors 3.0.10-2+deb12u1
+CVE-2024-6839
+	[bookworm] - python-flask-cors 3.0.10-2+deb12u1
+CVE-2024-6844
+	[bookworm] - python-flask-cors 3.0.10-2+deb12u1
+CVE-2023-28755
+	[bookworm] - ruby3.1 3.1.7-1~deb12u1
+CVE-2023-28756
+	[bookworm] - ruby3.1 3.1.7-1~deb12u1
+CVE-2024-27282
+	[bookworm] - ruby3.1 3.1.7-1~deb12u1
+CVE-2024-27281
+	[bookworm] - ruby3.1 3.1.7-1~deb12u1
+CVE-2024-27280
+	[bookworm] - ruby3.1 3.1.7-1~deb12u1
+CVE-2025-27219
+	[bookworm] - ruby3.1 3.1.7-1~deb12u1
+CVE-2025-27220
+	[bookworm] - ruby3.1 3.1.7-1~deb12u1
+CVE-2025-27221
+	[bookworm] - ruby3.1 3.1.7-1~deb12u1
+CVE-2025-20128
+	[bookworm] - clamav 1.0.9+dfsg-1~deb12u1
+CVE-2025-20260
+	[bookworm] - clamav 1.0.9+dfsg-1~deb12u1
+CVE-2024-33899
+	[bookworm] - rar 2:7.01-1~deb12u1
+CVE-2021-25743
+	[bookworm] - kubernetes 1.20.5+really1.20.2-1.1
+CVE-2025-48060
+	[bookworm] - jq 1.6-2.1+deb12u1
+CVE-2024-6174
+	[bookworm] - cloud-init 22.4.2-1+deb12u3
+CVE-2024-11584
+	[bookworm] - cloud-init 22.4.2-1+deb12u3
+CVE-2024-52530
+	[bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2024-52531
+	[bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2024-52532
+	[bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-32050
+	[bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-32051
+	[bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-32052
+	[bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-32053
+	[bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-2784
+	[bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-32909
+	[bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-32910
+	[bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-32911
+	[bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-46420
+	[bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-32912
+	[bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-32906
+	[bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2025-46421
+	[bookworm] - libsoup3 3.2.3-0+deb12u1
+CVE-2022-25844
+	[bookworm] - angular.js 1.8.3-1+deb12u1
+CVE-2023-26116
+	[bookworm] - angular.js 1.8.3-1+deb12u1
+CVE-2023-26117
+	[bookworm] - angular.js 1.8.3-1+deb12u1
+CVE-2023-26118
+	[bookworm] - angular.js 1.8.3-1+deb12u1
+CVE-2024-8372
+	[bookworm] - angular.js 1.8.3-1+deb12u1
+CVE-2024-8373
+	[bookworm] - angular.js 1.8.3-1+deb12u1
+CVE-2024-21490
+	[bookworm] - angular.js 1.8.3-1+deb12u1
+CVE-2025-0716
+	[bookworm] - angular.js 1.8.3-1+deb12u1
+CVE-2025-2336
+	[bookworm] - angular.js 1.8.3-1+deb12u1
+CVE-2025-27553
+	[bookworm] - commons-vfs 2.1-4+deb12u1
+CVE-2021-46310
+	[bookworm] - djvulibre 3.5.28-2.2~deb12u1
+CVE-2021-46312
+	[bookworm] - djvulibre 3.5.28-2.2~deb12u1
+CVE-2025-8058
+	[bookworm] - glibc 2.36-9+deb12u13
+CVE-2025-6021
+	[bookworm] - libxml2 2.9.14+dfsg-1.3~deb12u3
+CVE-2025-6170
+	[bookworm] - libxml2 2.9.14+dfsg-1.3~deb12u3
+CVE-2025-49794
+	[bookworm] - libxml2 2.9.14+dfsg-1.3~deb12u3
+CVE-2025-49796
+	[bookworm] - libxml2 2.9.14+dfsg-1.3~deb12u3
+CVE-2024-42516
+	[bookworm] - apache2 2.4.65-1~deb12u1
+CVE-2024-43204
+	[bookworm] - apache2 2.4.65-1~deb12u1
+CVE-2024-47252
+	[bookworm] - apache2 2.4.65-1~deb12u1
+CVE-2025-23048
+	[bookworm] - apache2 2.4.65-1~deb12u1
+CVE-2025-49630
+	[bookworm] - apache2 2.4.65-1~deb12u1
+CVE-2025-49812
+	[bookworm] - apache2 2.4.65-1~deb12u1
+CVE-2025-53020
+	[bookworm] - apache2 2.4.65-1~deb12u1
+CVE-2025-7783
+	[bookworm] - node-form-data 4.0.1-1+deb12u1


=====================================
data/next-point-update.txt
=====================================
@@ -1,284 +0,0 @@
-CVE-2025-46712
-	[bookworm] - erlang 1:25.2.3+dfsg-1+deb12u2
-CVE-2025-4748
-	[bookworm] - erlang 1:25.2.3+dfsg-1+deb12u2
-CVE-2025-46397
-	[bookworm] - fig2dev 1:3.2.8b-3+deb12u2
-CVE-2025-46398
-	[bookworm] - fig2dev 1:3.2.8b-3+deb12u2
-CVE-2025-46399
-	[bookworm] - fig2dev 1:3.2.8b-3+deb12u2
-CVE-2025-46400
-	[bookworm] - fig2dev 1:3.2.8b-3+deb12u2
-CVE-2024-39329
-	[bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-39330
-	[bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-39614
-	[bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-41989
-	[bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-41991
-	[bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-42005
-	[bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2023-39350
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-39351
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-39352
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-39353
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-39354
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-39356
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-40181
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-40186
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-40188
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-40567
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-40569
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2023-40589
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-22211
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32039
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32040
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32041
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32458
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32459
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32460
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32658
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32659
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32660
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-32661
-	[bookworm] - freerdp2 2.11.7+dfsg1-6~deb12u1
-CVE-2024-45234
-	[bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45235
-	[bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45236
-	[bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45237
-	[bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45238
-	[bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45239
-	[bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-48943
-	[bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2022-37660
-	[bookworm] - wpa 2:2.10-12+deb12u3
-CVE-2023-52425
-	[bookworm] - expat 2.5.0-1+deb12u2
-CVE-2024-50602
-	[bookworm] - expat 2.5.0-1+deb12u2
-CVE-2024-8176
-	[bookworm] - expat 2.5.0-1+deb12u2
-CVE-2024-8376
-	[bookworm] - mosquitto 2.0.11-1.2+deb12u2
-CVE-2024-3935
-	[bookworm] - mosquitto 2.0.11-1.2+deb12u2
-CVE-2024-10525
-	[bookworm] - mosquitto 2.0.11-1.2+deb12u2
-CVE-2025-27221
-	[bookworm] - rubygems 3.3.15-2+deb12u1
-CVE-2023-28755
-	[bookworm] - rubygems 3.3.15-2+deb12u1
-CVE-2025-32776
-	[bookworm] - openrazer 3.5.1+dfsg-2+deb12u1
-CVE-2025-46337
-	[bookworm] - libphp-adodb 5.21.4-1+deb12u1
-CVE-2023-52969
-	[bookworm] - mariadb 1:10.11.13-0+deb12u1
-CVE-2023-52970
-	[bookworm] - mariadb 1:10.11.13-0+deb12u1
-CVE-2023-52971
-	[bookworm] - mariadb 1:10.11.13-0+deb12u1
-CVE-2025-30693
-	[bookworm] - mariadb 1:10.11.13-0+deb12u1
-CVE-2025-30722
-	[bookworm] - mariadb 1:10.11.13-0+deb12u1
-CVE-2025-3576
-	[bookworm] - krb5 1.20.1-2+deb12u4
-CVE-2025-27773
-	[bookworm] - simplesamlphp 1.19.7-1+deb12u2
-CVE-2025-47203
-	[bookworm] - dropbear 2022.83-1+deb12u3
-CVE-2024-57823
-	[bookworm] - raptor2 2.0.15-4+deb12u1
-CVE-2024-57822
-	[bookworm] - raptor2 2.0.15-4+deb12u1
-CVE-2024-5569
-	[bookworm] - python-zipp 1.0.0-6+deb12u1
-CVE-2025-27516
-	[bookworm] - jinja2 3.1.2-1+deb12u3
-CVE-2025-43961
-	[bookworm] - libraw 0.20.2-2.1+deb12u1
-CVE-2025-43962
-	[bookworm] - libraw 0.20.2-2.1+deb12u1
-CVE-2025-43963
-	[bookworm] - libraw 0.20.2-2.1+deb12u1
-CVE-2025-43964
-	[bookworm] - libraw 0.20.2-2.1+deb12u1
-CVE-2025-47273
-	[bookworm] - setuptools 66.1.1-1+deb12u2
-CVE-2025-4802
-	[bookworm] - glibc 2.36-9+deb12u11
-CVE-2025-30224
-	[bookworm] - mydumper 0.10.1-1+deb12u2
-CVE-2025-3818
-	[bookworm] - webpy 1:0.62-4+deb12u1
-CVE-2025-40908
-	[bookworm] - libyaml-libyaml-perl 0.86+ds-1+deb12u1
-CVE-2024-50624
-	[bookworm] - kmail-account-wizard 4:22.12.3-1+deb12u1
-CVE-2025-1647
-	[bookworm] - twitter-bootstrap3 3.4.1+dfsg-3+deb12u2
-CVE-2025-30472
-	[bookworm] - corosync 3.1.7-1+deb12u1
-CVE-2024-12905
-	[bookworm] - node-tar-fs 2.1.3-0+deb12u1
-CVE-2025-48387
-	[bookworm] - node-tar-fs 2.1.3-0+deb12u1
-CVE-2025-4215
-	[bookworm] - ublock-origin 1.62.0+dfsg-0+deb12u1
-CVE-2023-26819
-	[bookworm] - cjson 1.7.15-1+deb12u3
-CVE-2023-53154
-	[bookworm] - cjson 1.7.15-1+deb12u3
-CVE-2024-56161
-	[bookworm] - amd64-microcode 3.20250311.1~deb12u1
-CVE-2024-1681
-	[bookworm] - python-flask-cors 3.0.10-2+deb12u1
-CVE-2024-6866
-	[bookworm] - python-flask-cors 3.0.10-2+deb12u1
-CVE-2024-6839
-	[bookworm] - python-flask-cors 3.0.10-2+deb12u1
-CVE-2024-6844
-	[bookworm] - python-flask-cors 3.0.10-2+deb12u1
-CVE-2023-28755
-	[bookworm] - ruby3.1 3.1.7-1~deb12u1
-CVE-2023-28756
-	[bookworm] - ruby3.1 3.1.7-1~deb12u1
-CVE-2024-27282
-	[bookworm] - ruby3.1 3.1.7-1~deb12u1
-CVE-2024-27281
-	[bookworm] - ruby3.1 3.1.7-1~deb12u1
-CVE-2024-27280
-	[bookworm] - ruby3.1 3.1.7-1~deb12u1
-CVE-2025-27219
-	[bookworm] - ruby3.1 3.1.7-1~deb12u1
-CVE-2025-27220
-	[bookworm] - ruby3.1 3.1.7-1~deb12u1
-CVE-2025-27221
-	[bookworm] - ruby3.1 3.1.7-1~deb12u1
-CVE-2025-20128
-	[bookworm] - clamav 1.0.9+dfsg-1~deb12u1
-CVE-2025-20260
-	[bookworm] - clamav 1.0.9+dfsg-1~deb12u1
-CVE-2024-33899
-	[bookworm] - rar 2:7.01-1~deb12u1
-CVE-2021-25743
-	[bookworm] - kubernetes 1.20.5+really1.20.2-1.1
-CVE-2025-48060
-	[bookworm] - jq 1.6-2.1+deb12u1
-CVE-2024-6174
-	[bookworm] - cloud-init 22.4.2-1+deb12u3
-CVE-2024-11584
-	[bookworm] - cloud-init 22.4.2-1+deb12u3
-CVE-2024-52530
-	[bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2024-52531
-	[bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2024-52532
-	[bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-32050
-	[bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-32051
-	[bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-32052
-	[bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-32053
-	[bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-2784
-	[bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-32909
-	[bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-32910
-	[bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-32911
-	[bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-46420
-	[bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-32912
-	[bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-32906
-	[bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2025-46421
-	[bookworm] - libsoup3 3.2.3-0+deb12u1
-CVE-2022-25844
-	[bookworm] - angular.js 1.8.3-1+deb12u1
-CVE-2023-26116
-	[bookworm] - angular.js 1.8.3-1+deb12u1
-CVE-2023-26117
-	[bookworm] - angular.js 1.8.3-1+deb12u1
-CVE-2023-26118
-	[bookworm] - angular.js 1.8.3-1+deb12u1
-CVE-2024-8372
-	[bookworm] - angular.js 1.8.3-1+deb12u1
-CVE-2024-8373
-	[bookworm] - angular.js 1.8.3-1+deb12u1
-CVE-2024-21490
-	[bookworm] - angular.js 1.8.3-1+deb12u1
-CVE-2025-0716
-	[bookworm] - angular.js 1.8.3-1+deb12u1
-CVE-2025-2336
-	[bookworm] - angular.js 1.8.3-1+deb12u1
-CVE-2025-27553
-	[bookworm] - commons-vfs 2.1-4+deb12u1
-CVE-2021-46310
-	[bookworm] - djvulibre 3.5.28-2.2~deb12u1
-CVE-2021-46312
-	[bookworm] - djvulibre 3.5.28-2.2~deb12u1
-CVE-2025-8058
-	[bookworm] - glibc 2.36-9+deb12u13
-CVE-2025-6021
-	[bookworm] - libxml2 2.9.14+dfsg-1.3~deb12u3
-CVE-2025-6170
-	[bookworm] - libxml2 2.9.14+dfsg-1.3~deb12u3
-CVE-2025-49794
-	[bookworm] - libxml2 2.9.14+dfsg-1.3~deb12u3
-CVE-2025-49796
-	[bookworm] - libxml2 2.9.14+dfsg-1.3~deb12u3
-CVE-2024-42516
-	[bookworm] - apache2 2.4.65-1~deb12u1
-CVE-2024-43204
-	[bookworm] - apache2 2.4.65-1~deb12u1
-CVE-2024-47252
-	[bookworm] - apache2 2.4.65-1~deb12u1
-CVE-2025-23048
-	[bookworm] - apache2 2.4.65-1~deb12u1
-CVE-2025-49630
-	[bookworm] - apache2 2.4.65-1~deb12u1
-CVE-2025-49812
-	[bookworm] - apache2 2.4.65-1~deb12u1
-CVE-2025-53020
-	[bookworm] - apache2 2.4.65-1~deb12u1
-CVE-2025-7783
-	[bookworm] - node-form-data 4.0.1-1+deb12u1


=====================================
doc/DSA.template
=====================================
@@ -14,6 +14,9 @@ Debian Bug     : $BUGNUM
 
 $TEXT
 
+For the oldstable distribution ($OLDSTABLE), this problem has been fixed
+in version $$OLDSTABLE_VERSION.
+
 For the stable distribution ($STABLE), this problem has been fixed in
 version $$STABLE_VERSION.
 


=====================================
static/distributions.json
=====================================
@@ -31,8 +31,8 @@
   },
   "trixie": {
     "major-version": "13",
-    "support": "none",
-    "contact": ""
+    "support": "security",
+    "contact": "team at security.debian.org"
   },
   "forky": {
     "major-version": "14",



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/7506d4bff92464368b344030d234d042e45ffbfc...37bb5e0917fd58fc6f2d8e6bc179c2db6e66d37e

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/7506d4bff92464368b344030d234d042e45ffbfc...37bb5e0917fd58fc6f2d8e6bc179c2db6e66d37e
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250809/b31fce23/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list