diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2023-10-06 22:40:17 +0200 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2023-10-06 22:54:48 +0200 |
commit | 6cdc0263a249644d05ea4a277ff7efd63d020fc7 (patch) | |
tree | 86b43f840bc428b1566fbd29f664528b2f76fc27 /data/next-point-update.txt | |
parent | 84bf7d53cd02e974963f966b735ac374df9a41a7 (diff) |
Merge changes for updates with CVEs via bookworm 12.2
Diffstat (limited to 'data/next-point-update.txt')
-rw-r--r-- | data/next-point-update.txt | 67 |
1 files changed, 0 insertions, 67 deletions
diff --git a/data/next-point-update.txt b/data/next-point-update.txt index 181113613d..8ada60c692 100644 --- a/data/next-point-update.txt +++ b/data/next-point-update.txt @@ -1,74 +1,7 @@ -CVE-2023-37365 - [bookworm] - hnswlib 0.6.2-2+deb12u1 -CVE-2023-26132 - [bookworm] - node-dottie 2.0.2-4+deb12u1 -CVE-2023-35936 - [bookworm] - pandoc 2.17.1.1-2~deb12u1 -CVE-2023-36054 - [bookworm] - krb5 1.20.1-2+deb12u1 -CVE-2023-39950 - [bookworm] - efibootguard 0.13-2+deb12u1 -CVE-2023-3255 - [bookworm] - qemu 1:7.2+dfsg-7+deb12u2 -CVE-2023-3354 - [bookworm] - qemu 1:7.2+dfsg-7+deb12u2 -CVE-2023-3180 - [bookworm] - qemu 1:7.2+dfsg-7+deb12u2 -CVE-2023-40303 - [bookworm] - inetutils 2:2.4-2+deb12u1 -CVE-2022-44729 - [bookworm] - batik 1.16+dfsg-1+deb12u1 -CVE-2022-44730 - [bookworm] - batik 1.16+dfsg-1+deb12u1 -CVE-2023-40477 - [bookworm] - unrar-nonfree 1:6.2.6-1+deb12u1 - [bookworm] - rar 2:6.23-1~deb12u1 -CVE-2023-2975 - [bookworm] - openssl 3.0.10-1~deb12u1 -CVE-2023-3446 - [bookworm] - openssl 3.0.10-1~deb12u1 -CVE-2023-3817 - [bookworm] - openssl 3.0.10-1~deb12u1 -CVE-2023-40305 - [bookworm] - indent 2.2.12-4+deb12u2 -CVE-2023-20197 - [bookworm] - clamav 1.0.2+dfsg-1~deb12u1 -CVE-2023-20212 - [bookworm] - clamav 1.0.2+dfsg-1~deb12u1 -CVE-2022-45582 - [bookworm] - horizon 3:23.0.0-5+deb12u1 -CVE-2023-37476 - [bookworm] - openrefine 3.6.2-2+deb12u1 -CVE-2023-40968 - [bookworm] - timg 1.4.5-1+deb12u1 -CVE-2023-38408 - [bookworm] - openssh 1:9.2p1-2+deb12u1 -CVE-2023-4504 - [bookworm] - cups 2.4.2-3+deb12u2 -CVE-2023-32360 - [bookworm] - cups 2.4.2-3+deb12u2 -CVE-2023-41081 - [bookworm] - libapache-mod-jk 1:1.2.48-2+deb12u1 -CVE-2023-38285 - [bookworm] - modsecurity 3.0.9-1+deb12u1 -CVE-2023-38039 - [bookworm] - curl 7.88.1-10+deb12u3 -CVE-2023-43770 - [bookworm] - roundcube 1.6.3+dfsg-1~deb12u1 -CVE-2023-38559 - [bookworm] - ghostscript 10.0.0~dfsg-11+deb12u2 -CVE-2023-43115 - [bookworm] - ghostscript 10.0.0~dfsg-11+deb12u2 -CVE-2023-44469 - [bookworm] - lemonldap-ng 2.16.1+ds-deb12u2 CVE-2023-XXXX [receiving with Lightning: partial MPP might be accepted] [bookworm] - electrum 4.3.4+dfsg1-1+deb12u1 CVE-2023-XXXX [code execution via malformed XTGETTCAP] [bookworm] - foot 1.13.1-2+deb12u1 -CVE-2023-41040 - [bookworm] - python-git 3.1.30-1+deb12u2 -CVE-2023-40267 - [bookworm] - python-git 3.1.30-1+deb12u2 CVE-2023-41887 [bookworm] - openrefine 3.6.2-2+deb12u2 CVE-2023-41886 |