[Git][security-tracker-team/security-tracker][master] Shuffle packages which did not make it for bookworm-pu for 12.11 to the end of list

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu May 15 21:58:46 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
c3249ed5 by Salvatore Bonaccorso at 2025-05-15T22:58:15+02:00
Shuffle packages which did not make it for bookworm-pu for 12.11 to the end of list

- - - - -


1 changed file:

- data/next-point-update.txt


Changes:

=====================================
data/next-point-update.txt
=====================================
@@ -4,80 +4,8 @@ CVE-2025-24528
 	[bookworm] - krb5 1.20.1-2+deb12u3
 CVE-2024-7347
 	[bookworm] - nginx 1.22.1-9+deb12u2
-CVE-2024-39329
-	[bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-39330
-	[bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-39614
-	[bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-41989
-	[bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-41991
-	[bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-42005
-	[bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2023-39350
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-39351
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-39352
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-39353
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-39354
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-39356
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-40181
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-40186
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-40188
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-40567
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-40569
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-40589
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-22211
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32039
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32040
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32041
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32458
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32459
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32460
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32658
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32659
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32660
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32661
-	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
 CVE-2023-4039
 	[bookworm] - gcc-12 12.2.0-14+deb12u1
-CVE-2024-45234
-	[bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45235
-	[bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45236
-	[bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45237
-	[bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45238
-	[bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45239
-	[bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-48943
-	[bookworm] - fort-validator 1.5.4-1+deb12u1
 CVE-2025-1390
 	[bookworm] - libcap2 1:2.66-4+deb12u1
 CVE-2025-2581
@@ -110,14 +38,6 @@ CVE-2025-24530
 	[bookworm] - phpmyadmin 4:5.2.1+dfsg-1+deb12u1
 CVE-2024-11831
 	[bookworm] - node-serialize-javascript 6.0.0-2+deb12u1
-CVE-2022-37660
-	[bookworm] - wpa 2:2.10-12+deb12u3
-CVE-2023-52425
-	[bookworm] - expat 2.5.0-1+deb12u2
-CVE-2024-50602
-	[bookworm] - expat 2.5.0-1+deb12u2
-CVE-2024-8176
-	[bookworm] - expat 2.5.0-1+deb12u2
 CVE-2024-6531
 	[bookworm] - twitter-bootstrap4 4.6.1+dfsg1-4+deb12u1
 CVE-2024-6485
@@ -136,20 +56,8 @@ CVE-2024-6383
 	[bookworm] - mongo-c-driver 1.23.1-1+deb12u1
 CVE-2025-0755
 	[bookworm] - mongo-c-driver 1.23.1-1+deb12u1
-CVE-2024-8376
-	[bookworm] - mosquitto 2.0.11-1.2+deb12u2
-CVE-2024-3935
-	[bookworm] - mosquitto 2.0.11-1.2+deb12u2
-CVE-2024-10525
-	[bookworm] - mosquitto 2.0.11-1.2+deb12u2
-CVE-2025-27221
-	[bookworm] - rubygems 3.3.15-2+deb12u1
-CVE-2023-28755
-	[bookworm] - rubygems 3.3.15-2+deb12u1
 CVE-2025-32728
 	[bookworm] - openssh 1:9.2p1-2+deb12u6
-CVE-2025-32776
-	[bookworm] - openrazer 3.5.1+dfsg-2+deb12u1
 CVE-2023-34872
 	[bookworm] - poppler 22.12.0-2+deb12u1
 CVE-2024-56378
@@ -184,18 +92,6 @@ CVE-2024-6383
 	[bookworm] - libbson-xs-perl 0.8.4-2+deb12u1
 CVE-2025-0755
 	[bookworm] - libbson-xs-perl 0.8.4-2+deb12u1
-CVE-2025-46337
-	[bookworm] - libphp-adodb 5.21.4-1+deb12u1
-CVE-2023-52969
-	[bookworm] - mariadb 1:10.11.12-0+deb12u1
-CVE-2023-52970
-	[bookworm] - mariadb 1:10.11.12-0+deb12u1
-CVE-2023-52971
-	[bookworm] - mariadb 1:10.11.12-0+deb12u1
-CVE-2025-30693
-	[bookworm] - mariadb 1:10.11.12-0+deb12u1
-CVE-2025-30722
-	[bookworm] - mariadb 1:10.11.12-0+deb12u1
 CVE-2025-23244
 	[bookworm] - nvidia-graphics-drivers 535.247.01-1~deb12u1
 CVE-2024-0150
@@ -220,16 +116,12 @@ CVE-2024-0131
 	[bookworm] - nvidia-open-gpu-kernel-modules 535.247.01-1~deb12u1
 CVE-2024-0149
 	[bookworm] - nvidia-open-gpu-kernel-modules 535.247.01-1~deb12u1
-CVE-2025-3576
-	[bookworm] - krb5 1.20.1-2+deb12u4
 CVE-2025-43965
 	[bookworm] - imagemagick 8:6.9.11.60+dfsg-1.6+deb12u3
 CVE-2025-4207
 	[bookworm] - postgresql-15 15.13-0+deb12u1
 CVE-2025-21605
 	[bookworm] - redis 5:7.0.15-1~deb12u4
-CVE-2025-27773
-	[bookworm] - simplesamlphp 1.19.7-1+deb12u2
 CVE-2025-46712
 	[bookworm] - erlang 1:25.2.3+dfsg-1+deb12u2
 CVE-2025-46397
@@ -240,3 +132,111 @@ CVE-2025-46399
 	[bookworm] - fig2dev 1:3.2.8b-3+deb12u2
 CVE-2025-46400
 	[bookworm] - fig2dev 1:3.2.8b-3+deb12u2
+CVE-2024-39329
+	[bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-39330
+	[bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-39614
+	[bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-41989
+	[bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-41991
+	[bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-42005
+	[bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2023-39350
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-39351
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-39352
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-39353
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-39354
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-39356
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-40181
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-40186
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-40188
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-40567
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-40569
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-40589
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-22211
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32039
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32040
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32041
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32458
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32459
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32460
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32658
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32659
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32660
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32661
+	[bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-45234
+	[bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45235
+	[bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45236
+	[bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45237
+	[bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45238
+	[bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45239
+	[bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-48943
+	[bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2022-37660
+	[bookworm] - wpa 2:2.10-12+deb12u3
+CVE-2023-52425
+	[bookworm] - expat 2.5.0-1+deb12u2
+CVE-2024-50602
+	[bookworm] - expat 2.5.0-1+deb12u2
+CVE-2024-8176
+	[bookworm] - expat 2.5.0-1+deb12u2
+CVE-2024-8376
+	[bookworm] - mosquitto 2.0.11-1.2+deb12u2
+CVE-2024-3935
+	[bookworm] - mosquitto 2.0.11-1.2+deb12u2
+CVE-2024-10525
+	[bookworm] - mosquitto 2.0.11-1.2+deb12u2
+CVE-2025-27221
+	[bookworm] - rubygems 3.3.15-2+deb12u1
+CVE-2023-28755
+	[bookworm] - rubygems 3.3.15-2+deb12u1
+CVE-2025-32776
+	[bookworm] - openrazer 3.5.1+dfsg-2+deb12u1
+CVE-2025-46337
+	[bookworm] - libphp-adodb 5.21.4-1+deb12u1
+CVE-2023-52969
+	[bookworm] - mariadb 1:10.11.12-0+deb12u1
+CVE-2023-52970
+	[bookworm] - mariadb 1:10.11.12-0+deb12u1
+CVE-2023-52971
+	[bookworm] - mariadb 1:10.11.12-0+deb12u1
+CVE-2025-30693
+	[bookworm] - mariadb 1:10.11.12-0+deb12u1
+CVE-2025-30722
+	[bookworm] - mariadb 1:10.11.12-0+deb12u1
+CVE-2025-3576
+	[bookworm] - krb5 1.20.1-2+deb12u4
+CVE-2025-27773
+	[bookworm] - simplesamlphp 1.19.7-1+deb12u2



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c3249ed5312e42186902ee06820dac4e86e1ae71

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c3249ed5312e42186902ee06820dac4e86e1ae71
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250515/11141480/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list