summaryrefslogtreecommitdiffstats
path: root/data/next-point-update.txt
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2023-10-06 22:40:17 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2023-10-06 22:54:48 +0200
commit6cdc0263a249644d05ea4a277ff7efd63d020fc7 (patch)
tree86b43f840bc428b1566fbd29f664528b2f76fc27 /data/next-point-update.txt
parent84bf7d53cd02e974963f966b735ac374df9a41a7 (diff)
Merge changes for updates with CVEs via bookworm 12.2
Diffstat (limited to 'data/next-point-update.txt')
-rw-r--r--data/next-point-update.txt67
1 files changed, 0 insertions, 67 deletions
diff --git a/data/next-point-update.txt b/data/next-point-update.txt
index 181113613d..8ada60c692 100644
--- a/data/next-point-update.txt
+++ b/data/next-point-update.txt
@@ -1,74 +1,7 @@
-CVE-2023-37365
- [bookworm] - hnswlib 0.6.2-2+deb12u1
-CVE-2023-26132
- [bookworm] - node-dottie 2.0.2-4+deb12u1
-CVE-2023-35936
- [bookworm] - pandoc 2.17.1.1-2~deb12u1
-CVE-2023-36054
- [bookworm] - krb5 1.20.1-2+deb12u1
-CVE-2023-39950
- [bookworm] - efibootguard 0.13-2+deb12u1
-CVE-2023-3255
- [bookworm] - qemu 1:7.2+dfsg-7+deb12u2
-CVE-2023-3354
- [bookworm] - qemu 1:7.2+dfsg-7+deb12u2
-CVE-2023-3180
- [bookworm] - qemu 1:7.2+dfsg-7+deb12u2
-CVE-2023-40303
- [bookworm] - inetutils 2:2.4-2+deb12u1
-CVE-2022-44729
- [bookworm] - batik 1.16+dfsg-1+deb12u1
-CVE-2022-44730
- [bookworm] - batik 1.16+dfsg-1+deb12u1
-CVE-2023-40477
- [bookworm] - unrar-nonfree 1:6.2.6-1+deb12u1
- [bookworm] - rar 2:6.23-1~deb12u1
-CVE-2023-2975
- [bookworm] - openssl 3.0.10-1~deb12u1
-CVE-2023-3446
- [bookworm] - openssl 3.0.10-1~deb12u1
-CVE-2023-3817
- [bookworm] - openssl 3.0.10-1~deb12u1
-CVE-2023-40305
- [bookworm] - indent 2.2.12-4+deb12u2
-CVE-2023-20197
- [bookworm] - clamav 1.0.2+dfsg-1~deb12u1
-CVE-2023-20212
- [bookworm] - clamav 1.0.2+dfsg-1~deb12u1
-CVE-2022-45582
- [bookworm] - horizon 3:23.0.0-5+deb12u1
-CVE-2023-37476
- [bookworm] - openrefine 3.6.2-2+deb12u1
-CVE-2023-40968
- [bookworm] - timg 1.4.5-1+deb12u1
-CVE-2023-38408
- [bookworm] - openssh 1:9.2p1-2+deb12u1
-CVE-2023-4504
- [bookworm] - cups 2.4.2-3+deb12u2
-CVE-2023-32360
- [bookworm] - cups 2.4.2-3+deb12u2
-CVE-2023-41081
- [bookworm] - libapache-mod-jk 1:1.2.48-2+deb12u1
-CVE-2023-38285
- [bookworm] - modsecurity 3.0.9-1+deb12u1
-CVE-2023-38039
- [bookworm] - curl 7.88.1-10+deb12u3
-CVE-2023-43770
- [bookworm] - roundcube 1.6.3+dfsg-1~deb12u1
-CVE-2023-38559
- [bookworm] - ghostscript 10.0.0~dfsg-11+deb12u2
-CVE-2023-43115
- [bookworm] - ghostscript 10.0.0~dfsg-11+deb12u2
-CVE-2023-44469
- [bookworm] - lemonldap-ng 2.16.1+ds-deb12u2
CVE-2023-XXXX [receiving with Lightning: partial MPP might be accepted]
[bookworm] - electrum 4.3.4+dfsg1-1+deb12u1
CVE-2023-XXXX [code execution via malformed XTGETTCAP]
[bookworm] - foot 1.13.1-2+deb12u1
-CVE-2023-41040
- [bookworm] - python-git 3.1.30-1+deb12u2
-CVE-2023-40267
- [bookworm] - python-git 3.1.30-1+deb12u2
CVE-2023-41887
[bookworm] - openrefine 3.6.2-2+deb12u2
CVE-2023-41886

© 2014-2024 Faster IT GmbH | imprint | privacy policy