summaryrefslogtreecommitdiffstats
path: root/data/next-oldstable-point-update.txt
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2023-10-06 22:58:33 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2023-10-06 22:58:33 +0200
commit027c1e33dae1363b3665b1b0d5444526a91da201 (patch)
tree478a3e08ebf20e3adb2d0b816739263a6c489f8d /data/next-oldstable-point-update.txt
parent3376376c177596275cc56b354d803e647ffd661a (diff)
Merge changes for updates with CVEs via bullseye 11.8
Diffstat (limited to 'data/next-oldstable-point-update.txt')
-rw-r--r--data/next-oldstable-point-update.txt162
1 files changed, 0 insertions, 162 deletions
diff --git a/data/next-oldstable-point-update.txt b/data/next-oldstable-point-update.txt
index 8456a25724..768ff4c914 100644
--- a/data/next-oldstable-point-update.txt
+++ b/data/next-oldstable-point-update.txt
@@ -1,167 +1,5 @@
-CVE-2022-46175
- [bullseye] - node-json5 2.1.3-2+deb11u1
-CVE-2022-21222
- [bullseye] - node-css-what 4.0.0-3+deb11u1
-CVE-2021-33587
- [bullseye] - node-css-what 4.0.0-3+deb11u1
-CVE-2021-22569
- [bullseye] - protobuf 3.12.4-1+deb11u1
-CVE-2021-22570
- [bullseye] - protobuf 3.12.4-1+deb11u1
-CVE-2022-1941
- [bullseye] - protobuf 3.12.4-1+deb11u1
-CVE-2023-29197
- [bullseye] - php-guzzlehttp-psr7 1.7.0-1+deb11u2
- [bullseye] - php-nyholm-psr7 1.3.2-2+deb11u1
-CVE-2021-45423
- [bullseye] - pev 0.81-3+deb11u1
-CVE-2023-24291
- [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-24288
- [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-24287
- [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-24285
- [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-24284
- [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-24283
- [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-27533
- [bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2023-27534
- [bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2023-27535
- [bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2023-27536
- [bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2023-27538
- [bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2021-33797
- [bullseye] - mujs 1.1.0-1+deb11u3
-CVE-2023-29491
- [bullseye] - ncurses 6.2+20201114-2+deb11u2
-CVE-2022-1537
- [bullseye] - grunt 1.3.0-1+deb11u2
-CVE-2023-30570
- [bullseye] - libreswan 4.3-1+deb11u4
-CVE-2022-47015
- [bullseye] - mariadb-10.5 1:10.5.20-0+deb11u1
-CVE-2023-28617
- [bullseye] - org-mode 9.4.0+dfsg-1+deb11u1
-CVE-2023-34969
- [bullseye] - dbus 1.12.28-0+deb11u1
-CVE-2023-34241
- [bullseye] - cups 2.3.3op2-3+deb11u3
-CVE-2023-32324
- [bullseye] - cups 2.3.3op2-3+deb11u3
-CVE-2023-4504
- [bullseye] - cups 2.3.3op2-3+deb11u4
-CVE-2023-32360
- [bullseye] - cups 2.3.3op2-3+deb11u4
-CVE-2023-33460
- [bullseye] - yajl 2.1.0-3+deb11u2
-CVE-2017-16516
- [bullseye] - yajl 2.1.0-3+deb11u2
-CVE-2022-24795
- [bullseye] - yajl 2.1.0-3+deb11u2
-CVE-2019-6706
- [bullseye] - lua5.3 5.3.3-1.1+deb11u1
-CVE-2020-24370
- [bullseye] - lua5.3 5.3.3-1.1+deb11u1
-CVE-2023-25516
- [bullseye] - nvidia-graphics-drivers-tesla-470 470.199.02-1
- [bullseye] - nvidia-graphics-drivers-tesla-450 450.248.02-1~deb11u1
- [bullseye] - nvidia-graphics-drivers 470.199.02-1
-CVE-2023-25515
- [bullseye] - nvidia-graphics-drivers-tesla-470 470.199.02-1
- [bullseye] - nvidia-graphics-drivers-tesla-450 450.248.02-1~deb11u1
- [bullseye] - nvidia-graphics-drivers 470.199.02-1
-CVE-2023-1672
- [bullseye] - tang 8-3+deb11u2
CVE-2023-XXXX [spip: Use a dedicated function to clean author data when preparing a session]
[bullseye] - spip 3.2.11-3+deb11u9
-CVE-2023-37365
- [bullseye] - hnswlib 0.4.0-3+deb11u1
-CVE-2023-35936
- [bullseye] - pandoc 2.9.2.1-1+deb11u1
-CVE-2023-36054
- [bullseye] - krb5 1.18.3-6+deb11u4
-CVE-2022-30333
- [bullseye] - rar 2:6.20-0.1~deb11u1
-CVE-2023-40477
- [bullseye] - rar 2:6.23-1~deb11u1
- [bullseye] - unrar-nonfree 1:6.0.3-1+deb11u3
-CVE-2022-48579
- [bullseye] - unrar-nonfree 1:6.0.3-1+deb11u2
-CVE-2023-40303
- [bullseye] - inetutils 2:2.0-1+deb11u2
-CVE-2022-44729
- [bullseye] - batik 1.12-4+deb11u2
-CVE-2022-44730
- [bullseye] - batik 1.12-4+deb11u2
-CVE-2023-3446
- [bullseye] - openssl 1.1.1v-0~deb11u1
-CVE-2023-3817
- [bullseye] - openssl 1.1.1v-0~deb11u1
-CVE-2023-20197
- [bullseye] - clamav 0.103.9+dfsg-0+deb11u1
-CVE-2023-38408
- [bullseye] - openssh 1:8.4p1-5+deb11u2
-CVE-2022-45582
- [bullseye] - horizon 3:18.6.2-5+deb11u2
-CVE-2021-23336
- [bullseye] - python2.7 2.7.18-8+deb11u1
-CVE-2022-0391
- [bullseye] - python2.7 2.7.18-8+deb11u1
-CVE-2022-48560
- [bullseye] - python2.7 2.7.18-8+deb11u1
-CVE-2022-48565
- [bullseye] - python2.7 2.7.18-8+deb11u1
-CVE-2022-48566
- [bullseye] - python2.7 2.7.18-8+deb11u1
-CVE-2023-24329
- [bullseye] - python2.7 2.7.18-8+deb11u1
-CVE-2023-40217
- [bullseye] - python2.7 2.7.18-8+deb11u1
-CVE-2021-20196
- [bullseye] - qemu 1:5.2+dfsg-11+deb11u3
-CVE-2023-0330
- [bullseye] - qemu 1:5.2+dfsg-11+deb11u3
-CVE-2023-1544
- [bullseye] - qemu 1:5.2+dfsg-11+deb11u3
-CVE-2023-3354
- [bullseye] - qemu 1:5.2+dfsg-11+deb11u3
-CVE-2021-3930
- [bullseye] - qemu 1:5.2+dfsg-11+deb11u3
-CVE-2023-3180
- [bullseye] - qemu 1:5.2+dfsg-11+deb11u3
-CVE-2021-20203
- [bullseye] - qemu 1:5.2+dfsg-11+deb11u3
-CVE-2021-3507
- [bullseye] - qemu 1:5.2+dfsg-11+deb11u3
-CVE-2020-14394
- [bullseye] - qemu 1:5.2+dfsg-11+deb11u3
-CVE-2023-3301
- [bullseye] - qemu 1:5.2+dfsg-11+deb11u3
-CVE-2022-0216
- [bullseye] - qemu 1:5.2+dfsg-11+deb11u3
-CVE-2023-41081
- [bullseye] - libapache-mod-jk 1:1.2.48-1+deb11u1
-CVE-2023-43770
- [bullseye] - roundcube 1.4.14+dfsg.1-1~deb11u1
-CVE-2023-38559
- [bullseye] - ghostscript 9.53.3~dfsg-7+deb11u6
-CVE-2023-43115
- [bullseye] - ghostscript 9.53.3~dfsg-7+deb11u6
-CVE-2023-44469
- [bullseye] - lemonldap-ng 2.0.11+ds-4+deb11u5
-CVE-2021-38185
- [bullseye] - cpio 2.13+dfsg-7.1~deb11u1
-CVE-2023-28322
- [bullseye] - curl 7.74.0-1.3+deb11u9
-CVE-2023-28321
- [bullseye] - curl 7.74.0-1.3+deb11u9
CVE-2023-32665
[bullseye] - glib2.0 2.66.8-1+deb11u1
CVE-2023-32611

© 2014-2024 Faster IT GmbH | imprint | privacy policy