summaryrefslogtreecommitdiffstats
path: root/data/next-oldstable-point-update.txt
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2023-03-05 14:14:05 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2023-06-08 17:46:26 +0200
commit48b4ba5661775f4fb5cd5e6e2dfaf992628dd485 (patch)
treeeb365ba12b859fc3718b05051e1d8e3f67b9ef51 /data/next-oldstable-point-update.txt
parentf1967f98b30d3b91fa566ba6886e32f9b841899a (diff)
Move next-point-update.txt to next-oldstable-point-update.txt
All what is potentially pending for the next bullseye point release is not to be considered for the next stable point update. Make an empty list for bookworm (stable). Signed-off-by: Salvatore Bonaccorso <carnil@debian.org>
Diffstat (limited to 'data/next-oldstable-point-update.txt')
-rw-r--r--data/next-oldstable-point-update.txt123
1 files changed, 119 insertions, 4 deletions
diff --git a/data/next-oldstable-point-update.txt b/data/next-oldstable-point-update.txt
index 6067a5b172..80596df300 100644
--- a/data/next-oldstable-point-update.txt
+++ b/data/next-oldstable-point-update.txt
@@ -1,4 +1,119 @@
-CVE-2019-14433
- [buster] - nova 2:18.1.0-6+deb10u1
-CVE-2022-28737
- [buster] - shim 15.6-1~deb10u1
+CVE-2022-3650
+ [bullseye] - ceph 14.2.21-1+deb11u1
+CVE-2021-32718
+ [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-32719
+ [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-22116
+ [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2018-1279
+ [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-3654
+ [bullseye] - nova 2:22.2.2-1+deb11u1
+CVE-2022-27240
+ [bullseye] - glewlwyd 2.5.2-2+deb11u3
+CVE-2022-29967
+ [bullseye] - glewlwyd 2.5.2-2+deb11u3
+CVE-2022-32096
+ [bullseye] - rhonabwy 0.9.13-3+deb11u2
+CVE-2021-24119
+ [bullseye] - mbedtls 2.16.12-0+deb11u1
+CVE-2021-44732
+ [bullseye] - mbedtls 2.16.12-0+deb11u1
+CVE-2022-2996
+ [bullseye] - python-scciclient 0.8.0-2+deb11u1
+CVE-2022-42961
+ [bullseye] - wolfssl 4.6.0+p1-0+deb11u2
+CVE-2022-39173
+ [bullseye] - wolfssl 4.6.0+p1-0+deb11u2
+CVE-2022-42905
+ [bullseye] - wolfssl 4.6.0+p1-0+deb11u2
+CVE-2022-46175
+ [bullseye] - node-json5 2.1.3-2+deb11u1
+CVE-2022-24859
+ [bullseye] - pypdf2 1.26.0-4+deb11u1
+CVE-2022-48279
+ [bullseye] - modsecurity-apache 2.9.3-3+deb11u2
+CVE-2023-24021
+ [bullseye] - modsecurity-apache 2.9.3-3+deb11u2
+CVE-2022-21222
+ [bullseye] - node-css-what 4.0.0-3+deb11u1
+CVE-2021-33587
+ [bullseye] - node-css-what 4.0.0-3+deb11u1
+CVE-2021-22569
+ [bullseye] - protobuf 3.12.4-1+deb11u1
+CVE-2021-22570
+ [bullseye] - protobuf 3.12.4-1+deb11u1
+CVE-2022-1941
+ [bullseye] - protobuf 3.12.4-1+deb11u1
+CVE-2023-0842
+ [bullseye] - node-xml2js 0.2.8-1+deb11u1
+CVE-2023-29197
+ [bullseye] - php-guzzlehttp-psr7 1.7.0-1+deb11u2
+ [bullseye] - php-nyholm-psr7 1.3.2-2+deb11u1
+CVE-2021-45423
+ [bullseye] - pev 0.81-3+deb11u1
+CVE-2023-24291
+ [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-2428
+ [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-24287
+ [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-24285
+ [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-24284
+ [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-24283
+ [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-27533
+ [bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2023-27534
+ [bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2023-27535
+ [bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2023-27536
+ [bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2023-27538
+ [bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2021-33797
+ [bullseye] - mujs 1.1.0-1+deb11u3
+CVE-2023-29491
+ [bullseye] - ncurses 6.2+20201114-2+deb11u2
+CVE-2022-0512
+ [bullseye] - node-url-parse 1.5.3-1+deb11u2
+CVE-2022-1537
+ [bullseye] - grunt 1.3.0-1+deb11u2
+CVE-2023-30570
+ [bullseye] - libreswan 4.3-1+deb11u4
+CVE-2022-47015
+ [bullseye] - mariadb-10.5 1:10.5.20-0+deb11u1
+CVE-2023-28617
+ [bullseye] - org-mode 9.4.0+dfsg-1+deb11u1
+CVE-2021-3574
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-4219
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20241
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20243
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20244
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20245
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20246
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20309
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-39212
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-1114
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-28463
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-32545
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-32546
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2023-34969
+ [bullseye] - dbus 1.12.28-0+deb11u1

© 2014-2024 Faster IT GmbH | imprint | privacy policy