[Git][security-tracker-team/security-tracker][master] Shuffle packages which did not make it for bookworm-pu for 12.11 to the end of list
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu May 15 21:58:46 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
c3249ed5 by Salvatore Bonaccorso at 2025-05-15T22:58:15+02:00
Shuffle packages which did not make it for bookworm-pu for 12.11 to the end of list
- - - - -
1 changed file:
- data/next-point-update.txt
Changes:
=====================================
data/next-point-update.txt
=====================================
@@ -4,80 +4,8 @@ CVE-2025-24528
[bookworm] - krb5 1.20.1-2+deb12u3
CVE-2024-7347
[bookworm] - nginx 1.22.1-9+deb12u2
-CVE-2024-39329
- [bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-39330
- [bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-39614
- [bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-41989
- [bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-41991
- [bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2024-42005
- [bookworm] - python-django 3:3.2.19-1+deb12u2
-CVE-2023-39350
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-39351
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-39352
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-39353
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-39354
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-39356
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-40181
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-40186
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-40188
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-40567
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-40569
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2023-40589
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-22211
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32039
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32040
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32041
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32458
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32459
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32460
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32658
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32659
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32660
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
-CVE-2024-32661
- [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
CVE-2023-4039
[bookworm] - gcc-12 12.2.0-14+deb12u1
-CVE-2024-45234
- [bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45235
- [bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45236
- [bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45237
- [bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45238
- [bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-45239
- [bookworm] - fort-validator 1.5.4-1+deb12u1
-CVE-2024-48943
- [bookworm] - fort-validator 1.5.4-1+deb12u1
CVE-2025-1390
[bookworm] - libcap2 1:2.66-4+deb12u1
CVE-2025-2581
@@ -110,14 +38,6 @@ CVE-2025-24530
[bookworm] - phpmyadmin 4:5.2.1+dfsg-1+deb12u1
CVE-2024-11831
[bookworm] - node-serialize-javascript 6.0.0-2+deb12u1
-CVE-2022-37660
- [bookworm] - wpa 2:2.10-12+deb12u3
-CVE-2023-52425
- [bookworm] - expat 2.5.0-1+deb12u2
-CVE-2024-50602
- [bookworm] - expat 2.5.0-1+deb12u2
-CVE-2024-8176
- [bookworm] - expat 2.5.0-1+deb12u2
CVE-2024-6531
[bookworm] - twitter-bootstrap4 4.6.1+dfsg1-4+deb12u1
CVE-2024-6485
@@ -136,20 +56,8 @@ CVE-2024-6383
[bookworm] - mongo-c-driver 1.23.1-1+deb12u1
CVE-2025-0755
[bookworm] - mongo-c-driver 1.23.1-1+deb12u1
-CVE-2024-8376
- [bookworm] - mosquitto 2.0.11-1.2+deb12u2
-CVE-2024-3935
- [bookworm] - mosquitto 2.0.11-1.2+deb12u2
-CVE-2024-10525
- [bookworm] - mosquitto 2.0.11-1.2+deb12u2
-CVE-2025-27221
- [bookworm] - rubygems 3.3.15-2+deb12u1
-CVE-2023-28755
- [bookworm] - rubygems 3.3.15-2+deb12u1
CVE-2025-32728
[bookworm] - openssh 1:9.2p1-2+deb12u6
-CVE-2025-32776
- [bookworm] - openrazer 3.5.1+dfsg-2+deb12u1
CVE-2023-34872
[bookworm] - poppler 22.12.0-2+deb12u1
CVE-2024-56378
@@ -184,18 +92,6 @@ CVE-2024-6383
[bookworm] - libbson-xs-perl 0.8.4-2+deb12u1
CVE-2025-0755
[bookworm] - libbson-xs-perl 0.8.4-2+deb12u1
-CVE-2025-46337
- [bookworm] - libphp-adodb 5.21.4-1+deb12u1
-CVE-2023-52969
- [bookworm] - mariadb 1:10.11.12-0+deb12u1
-CVE-2023-52970
- [bookworm] - mariadb 1:10.11.12-0+deb12u1
-CVE-2023-52971
- [bookworm] - mariadb 1:10.11.12-0+deb12u1
-CVE-2025-30693
- [bookworm] - mariadb 1:10.11.12-0+deb12u1
-CVE-2025-30722
- [bookworm] - mariadb 1:10.11.12-0+deb12u1
CVE-2025-23244
[bookworm] - nvidia-graphics-drivers 535.247.01-1~deb12u1
CVE-2024-0150
@@ -220,16 +116,12 @@ CVE-2024-0131
[bookworm] - nvidia-open-gpu-kernel-modules 535.247.01-1~deb12u1
CVE-2024-0149
[bookworm] - nvidia-open-gpu-kernel-modules 535.247.01-1~deb12u1
-CVE-2025-3576
- [bookworm] - krb5 1.20.1-2+deb12u4
CVE-2025-43965
[bookworm] - imagemagick 8:6.9.11.60+dfsg-1.6+deb12u3
CVE-2025-4207
[bookworm] - postgresql-15 15.13-0+deb12u1
CVE-2025-21605
[bookworm] - redis 5:7.0.15-1~deb12u4
-CVE-2025-27773
- [bookworm] - simplesamlphp 1.19.7-1+deb12u2
CVE-2025-46712
[bookworm] - erlang 1:25.2.3+dfsg-1+deb12u2
CVE-2025-46397
@@ -240,3 +132,111 @@ CVE-2025-46399
[bookworm] - fig2dev 1:3.2.8b-3+deb12u2
CVE-2025-46400
[bookworm] - fig2dev 1:3.2.8b-3+deb12u2
+CVE-2024-39329
+ [bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-39330
+ [bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-39614
+ [bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-41989
+ [bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-41991
+ [bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2024-42005
+ [bookworm] - python-django 3:3.2.19-1+deb12u2
+CVE-2023-39350
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-39351
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-39352
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-39353
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-39354
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-39356
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-40181
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-40186
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-40188
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-40567
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-40569
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2023-40589
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-22211
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32039
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32040
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32041
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32458
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32459
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32460
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32658
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32659
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32660
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-32661
+ [bookworm] - freerdp2 2.11.7+dfsg1-6deb12u1
+CVE-2024-45234
+ [bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45235
+ [bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45236
+ [bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45237
+ [bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45238
+ [bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-45239
+ [bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2024-48943
+ [bookworm] - fort-validator 1.5.4-1+deb12u1
+CVE-2022-37660
+ [bookworm] - wpa 2:2.10-12+deb12u3
+CVE-2023-52425
+ [bookworm] - expat 2.5.0-1+deb12u2
+CVE-2024-50602
+ [bookworm] - expat 2.5.0-1+deb12u2
+CVE-2024-8176
+ [bookworm] - expat 2.5.0-1+deb12u2
+CVE-2024-8376
+ [bookworm] - mosquitto 2.0.11-1.2+deb12u2
+CVE-2024-3935
+ [bookworm] - mosquitto 2.0.11-1.2+deb12u2
+CVE-2024-10525
+ [bookworm] - mosquitto 2.0.11-1.2+deb12u2
+CVE-2025-27221
+ [bookworm] - rubygems 3.3.15-2+deb12u1
+CVE-2023-28755
+ [bookworm] - rubygems 3.3.15-2+deb12u1
+CVE-2025-32776
+ [bookworm] - openrazer 3.5.1+dfsg-2+deb12u1
+CVE-2025-46337
+ [bookworm] - libphp-adodb 5.21.4-1+deb12u1
+CVE-2023-52969
+ [bookworm] - mariadb 1:10.11.12-0+deb12u1
+CVE-2023-52970
+ [bookworm] - mariadb 1:10.11.12-0+deb12u1
+CVE-2023-52971
+ [bookworm] - mariadb 1:10.11.12-0+deb12u1
+CVE-2025-30693
+ [bookworm] - mariadb 1:10.11.12-0+deb12u1
+CVE-2025-30722
+ [bookworm] - mariadb 1:10.11.12-0+deb12u1
+CVE-2025-3576
+ [bookworm] - krb5 1.20.1-2+deb12u4
+CVE-2025-27773
+ [bookworm] - simplesamlphp 1.19.7-1+deb12u2
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c3249ed5312e42186902ee06820dac4e86e1ae71
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c3249ed5312e42186902ee06820dac4e86e1ae71
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250515/11141480/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list