diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2023-10-06 06:41:36 +0200 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2023-10-06 06:41:36 +0200 |
commit | 9438aa5770b9d5ec0571b4ce69da80bcd5697dd3 (patch) | |
tree | 3efca33a5a4ea9227013dad3e81f0c1410af17d0 /data/next-oldstable-point-update.txt | |
parent | 426cf021328ecd46fd2a904a9ad25ca3554d1512 (diff) |
Review list of bullseye-pu updates (move unaccepted ones to end of list)
Diffstat (limited to 'data/next-oldstable-point-update.txt')
-rw-r--r-- | data/next-oldstable-point-update.txt | 140 |
1 files changed, 70 insertions, 70 deletions
diff --git a/data/next-oldstable-point-update.txt b/data/next-oldstable-point-update.txt index b9c1a48f44..0c098e8840 100644 --- a/data/next-oldstable-point-update.txt +++ b/data/next-oldstable-point-update.txt @@ -1,41 +1,5 @@ -CVE-2022-3650 - [bullseye] - ceph 14.2.21-1+deb11u1 -CVE-2021-32718 - [bullseye] - rabbitmq-server 3.8.9-3+deb11u1 -CVE-2021-32719 - [bullseye] - rabbitmq-server 3.8.9-3+deb11u1 -CVE-2021-22116 - [bullseye] - rabbitmq-server 3.8.9-3+deb11u1 -CVE-2018-1279 - [bullseye] - rabbitmq-server 3.8.9-3+deb11u1 -CVE-2021-3654 - [bullseye] - nova 2:22.2.2-1+deb11u1 -CVE-2022-27240 - [bullseye] - glewlwyd 2.5.2-2+deb11u3 -CVE-2022-29967 - [bullseye] - glewlwyd 2.5.2-2+deb11u3 -CVE-2022-32096 - [bullseye] - rhonabwy 0.9.13-3+deb11u2 -CVE-2021-24119 - [bullseye] - mbedtls 2.16.12-0+deb11u1 -CVE-2021-44732 - [bullseye] - mbedtls 2.16.12-0+deb11u1 -CVE-2022-2996 - [bullseye] - python-scciclient 0.8.0-2+deb11u1 -CVE-2022-42961 - [bullseye] - wolfssl 4.6.0+p1-0+deb11u2 -CVE-2022-39173 - [bullseye] - wolfssl 4.6.0+p1-0+deb11u2 -CVE-2022-42905 - [bullseye] - wolfssl 4.6.0+p1-0+deb11u2 CVE-2022-46175 [bullseye] - node-json5 2.1.3-2+deb11u1 -CVE-2022-24859 - [bullseye] - pypdf2 1.26.0-4+deb11u1 -CVE-2022-48279 - [bullseye] - modsecurity-apache 2.9.3-3+deb11u2 -CVE-2023-24021 - [bullseye] - modsecurity-apache 2.9.3-3+deb11u2 CVE-2022-21222 [bullseye] - node-css-what 4.0.0-3+deb11u1 CVE-2021-33587 @@ -46,8 +10,6 @@ CVE-2021-22570 [bullseye] - protobuf 3.12.4-1+deb11u1 CVE-2022-1941 [bullseye] - protobuf 3.12.4-1+deb11u1 -CVE-2023-0842 - [bullseye] - node-xml2js 0.2.8-1+deb11u1 CVE-2023-29197 [bullseye] - php-guzzlehttp-psr7 1.7.0-1+deb11u2 [bullseye] - php-nyholm-psr7 1.3.2-2+deb11u1 @@ -79,8 +41,6 @@ CVE-2021-33797 [bullseye] - mujs 1.1.0-1+deb11u3 CVE-2023-29491 [bullseye] - ncurses 6.2+20201114-2+deb11u2 -CVE-2022-0512 - [bullseye] - node-url-parse 1.5.3-1+deb11u2 CVE-2022-1537 [bullseye] - grunt 1.3.0-1+deb11u2 CVE-2023-30570 @@ -89,32 +49,6 @@ CVE-2022-47015 [bullseye] - mariadb-10.5 1:10.5.20-0+deb11u1 CVE-2023-28617 [bullseye] - org-mode 9.4.0+dfsg-1+deb11u1 -CVE-2021-3574 - [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 -CVE-2021-4219 - [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 -CVE-2021-20241 - [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 -CVE-2021-20243 - [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 -CVE-2021-20244 - [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 -CVE-2021-20245 - [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 -CVE-2021-20246 - [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 -CVE-2021-20309 - [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 -CVE-2021-39212 - [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 -CVE-2022-1114 - [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 -CVE-2022-28463 - [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 -CVE-2022-32545 - [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 -CVE-2022-32546 - [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 CVE-2023-34969 [bullseye] - dbus 1.12.28-0+deb11u1 CVE-2023-34241 @@ -145,10 +79,6 @@ CVE-2023-25515 [bullseye] - nvidia-graphics-drivers 470.199.02-1 CVE-2023-1672 [bullseye] - tang 8-3+deb11u2 -CVE-2023-26136 - [bullseye] - node-tough-cookie 4.0.0-2+deb11u1 -CVE-2023-26132 - [bullseye] - node-dottie 2.0.2-4+deb11u1 CVE-2023-XXXX [spip: Use a dedicated function to clean author data when preparing a session] [bullseye] - spip 3.2.11-3+deb11u9 CVE-2023-37365 @@ -270,3 +200,73 @@ CVE-2023-29499 [bullseye] - glib2.0 2.66.8-1+deb11u1 CVE-2023-5157 [bullseye] - galera-4 26.4.14-0+deb11u1 +CVE-2022-3650 + [bullseye] - ceph 14.2.21-1+deb11u1 +CVE-2021-32718 + [bullseye] - rabbitmq-server 3.8.9-3+deb11u1 +CVE-2021-32719 + [bullseye] - rabbitmq-server 3.8.9-3+deb11u1 +CVE-2021-22116 + [bullseye] - rabbitmq-server 3.8.9-3+deb11u1 +CVE-2018-1279 + [bullseye] - rabbitmq-server 3.8.9-3+deb11u1 +CVE-2021-3654 + [bullseye] - nova 2:22.2.2-1+deb11u1 +CVE-2022-27240 + [bullseye] - glewlwyd 2.5.2-2+deb11u3 +CVE-2022-29967 + [bullseye] - glewlwyd 2.5.2-2+deb11u3 +CVE-2021-24119 + [bullseye] - mbedtls 2.16.12-0+deb11u1 +CVE-2021-44732 + [bullseye] - mbedtls 2.16.12-0+deb11u1 +CVE-2022-32096 + [bullseye] - rhonabwy 0.9.13-3+deb11u2 +CVE-2022-2996 + [bullseye] - python-scciclient 0.8.0-2+deb11u1 +CVE-2022-42961 + [bullseye] - wolfssl 4.6.0+p1-0+deb11u2 +CVE-2022-39173 + [bullseye] - wolfssl 4.6.0+p1-0+deb11u2 +CVE-2022-42905 + [bullseye] - wolfssl 4.6.0+p1-0+deb11u2 +CVE-2022-24859 + [bullseye] - pypdf2 1.26.0-4+deb11u1 +CVE-2022-48279 + [bullseye] - modsecurity-apache 2.9.3-3+deb11u2 +CVE-2023-24021 + [bullseye] - modsecurity-apache 2.9.3-3+deb11u2 +CVE-2023-0842 + [bullseye] - node-xml2js 0.2.8-1+deb11u1 +CVE-2022-0512 + [bullseye] - node-url-parse 1.5.3-1+deb11u2 +CVE-2021-3574 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2021-4219 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2021-20241 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2021-20243 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2021-20244 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2021-20245 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2021-20246 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2021-20309 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2021-39212 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2022-1114 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2022-28463 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2022-32545 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2022-32546 + [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2 +CVE-2023-26136 + [bullseye] - node-tough-cookie 4.0.0-2+deb11u1 +CVE-2023-26132 + [bullseye] - node-dottie 2.0.2-4+deb11u1 |