diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2023-03-05 14:14:05 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2023-06-08 17:46:26 +0200 |
commit | 48b4ba5661775f4fb5cd5e6e2dfaf992628dd485 (patch) | |
tree | eb365ba12b859fc3718b05051e1d8e3f67b9ef51 /data/next-oldstable-point-update.txt | |
parent | f1967f98b30d3b91fa566ba6886e32f9b841899a (diff) |
Move next-point-update.txt to next-oldstable-point-update.txt
All what is potentially pending for the next bullseye point release is
not to be considered for the next stable point update. Make an empty
list for bookworm (stable).
Signed-off-by: Salvatore Bonaccorso <carnil@debian.org>
Diffstat (limited to 'data/next-oldstable-point-update.txt')
-rw-r--r-- | data/next-oldstable-point-update.txt | 123 |
1 files changed, 119 insertions, 4 deletions
diff --git a/data/next-oldstable-point-update.txt b/data/next-oldstable-point-update.txt index 6067a5b172..80596df300 100644 --- a/data/next-oldstable-point-update.txt +++ b/data/next-oldstable-point-update.txt @@ -1,4 +1,119 @@ -CVE-2019-14433 - [buster] - nova 2:18.1.0-6+deb10u1 -CVE-2022-28737 - [buster] - shim 15.6-1~deb10u1 +CVE-2022-3650 + [bullseye] - ceph 14.2.21-1+deb11u1 +CVE-2021-32718 + [bullseye] - rabbitmq-server 3.8.9-3+deb11u1 +CVE-2021-32719 + [bullseye] - rabbitmq-server 3.8.9-3+deb11u1 +CVE-2021-22116 + [bullseye] - rabbitmq-server 3.8.9-3+deb11u1 +CVE-2018-1279 + [bullseye] - rabbitmq-server 3.8.9-3+deb11u1 +CVE-2021-3654 + [bullseye] - nova 2:22.2.2-1+deb11u1 +CVE-2022-27240 + [bullseye] - glewlwyd 2.5.2-2+deb11u3 +CVE-2022-29967 + [bullseye] - glewlwyd 2.5.2-2+deb11u3 +CVE-2022-32096 + [bullseye] - rhonabwy 0.9.13-3+deb11u2 +CVE-2021-24119 + [bullseye] - mbedtls 2.16.12-0+deb11u1 +CVE-2021-44732 + [bullseye] - mbedtls 2.16.12-0+deb11u1 +CVE-2022-2996 + [bullseye] - python-scciclient 0.8.0-2+deb11u1 +CVE-2022-42961 + [bullseye] - wolfssl 4.6.0+p1-0+deb11u2 +CVE-2022-39173 + [bullseye] - wolfssl 4.6.0+p1-0+deb11u2 +CVE-2022-42905 + [bullseye] - wolfssl 4.6.0+p1-0+deb11u2 +CVE-2022-46175 + [bullseye] - node-json5 2.1.3-2+deb11u1 +CVE-2022-24859 + [bullseye] - pypdf2 1.26.0-4+deb11u1 +CVE-2022-48279 + [bullseye] - modsecurity-apache 2.9.3-3+deb11u2 +CVE-2023-24021 + [bullseye] - modsecurity-apache 2.9.3-3+deb11u2 +CVE-2022-21222 + [bullseye] - node-css-what 4.0.0-3+deb11u1 +CVE-2021-33587 + [bullseye] - node-css-what 4.0.0-3+deb11u1 +CVE-2021-22569 + [bullseye] - protobuf 3.12.4-1+deb11u1 +CVE-2021-22570 + [bullseye] - protobuf 3.12.4-1+deb11u1 +CVE-2022-1941 + [bullseye] - protobuf 3.12.4-1+deb11u1 +CVE-2023-0842 + [bullseye] - node-xml2js 0.2.8-1+deb11u1 +CVE-2023-29197 + [bullseye] - php-guzzlehttp-psr7 1.7.0-1+deb11u2 + [bullseye] - php-nyholm-psr7 1.3.2-2+deb11u1 +CVE-2021-45423 + [bullseye] - pev 0.81-3+deb11u1 +CVE-2023-24291 + [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1 +CVE-2023-2428 + [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1 +CVE-2023-24287 + [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1 +CVE-2023-24285 + [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1 +CVE-2023-24284 + [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1 +CVE-2023-24283 + [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1 +CVE-2023-27533 + [bullseye] - curl 7.74.0-1.3+deb11u8 +CVE-2023-27534 + [bullseye] - curl 7.74.0-1.3+deb11u8 +CVE-2023-27535 + [bullseye] - curl 7.74.0-1.3+deb11u8 +CVE-2023-27536 + [bullseye] - curl 7.74.0-1.3+deb11u8 +CVE-2023-27538 + [bullseye] - curl 7.74.0-1.3+deb11u8 +CVE-2021-33797 + [bullseye] - mujs 1.1.0-1+deb11u3 +CVE-2023-29491 + [bullseye] - ncurses 6.2+20201114-2+deb11u2 +CVE-2022-0512 + [bullseye] - node-url-parse 1.5.3-1+deb11u2 +CVE-2022-1537 + [bullseye] - grunt 1.3.0-1+deb11u2 +CVE-2023-30570 + [bullseye] - libreswan 4.3-1+deb11u4 +CVE-2022-47015 + [bullseye] - mariadb-10.5 1:10.5.20-0+deb11u1 +CVE-2023-28617 + [bullseye] - org-mode 9.4.0+dfsg-1+deb11u1 +CVE-2021-3574 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2021-4219 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2021-20241 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2021-20243 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2021-20244 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2021-20245 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2021-20246 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2021-20309 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2021-39212 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2022-1114 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2022-28463 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2022-32545 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2022-32546 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2023-34969 + [bullseye] - dbus 1.12.28-0+deb11u1 |