summaryrefslogtreecommitdiffstats
path: root/data
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2023-03-05 14:14:05 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2023-06-08 17:46:26 +0200
commit48b4ba5661775f4fb5cd5e6e2dfaf992628dd485 (patch)
treeeb365ba12b859fc3718b05051e1d8e3f67b9ef51 /data
parentf1967f98b30d3b91fa566ba6886e32f9b841899a (diff)
Move next-point-update.txt to next-oldstable-point-update.txt
All what is potentially pending for the next bullseye point release is not to be considered for the next stable point update. Make an empty list for bookworm (stable). Signed-off-by: Salvatore Bonaccorso <carnil@debian.org>
Diffstat (limited to 'data')
-rw-r--r--data/next-oldstable-point-update.txt123
-rw-r--r--data/next-point-update.txt119
2 files changed, 119 insertions, 123 deletions
diff --git a/data/next-oldstable-point-update.txt b/data/next-oldstable-point-update.txt
index 6067a5b172..80596df300 100644
--- a/data/next-oldstable-point-update.txt
+++ b/data/next-oldstable-point-update.txt
@@ -1,4 +1,119 @@
-CVE-2019-14433
- [buster] - nova 2:18.1.0-6+deb10u1
-CVE-2022-28737
- [buster] - shim 15.6-1~deb10u1
+CVE-2022-3650
+ [bullseye] - ceph 14.2.21-1+deb11u1
+CVE-2021-32718
+ [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-32719
+ [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-22116
+ [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2018-1279
+ [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
+CVE-2021-3654
+ [bullseye] - nova 2:22.2.2-1+deb11u1
+CVE-2022-27240
+ [bullseye] - glewlwyd 2.5.2-2+deb11u3
+CVE-2022-29967
+ [bullseye] - glewlwyd 2.5.2-2+deb11u3
+CVE-2022-32096
+ [bullseye] - rhonabwy 0.9.13-3+deb11u2
+CVE-2021-24119
+ [bullseye] - mbedtls 2.16.12-0+deb11u1
+CVE-2021-44732
+ [bullseye] - mbedtls 2.16.12-0+deb11u1
+CVE-2022-2996
+ [bullseye] - python-scciclient 0.8.0-2+deb11u1
+CVE-2022-42961
+ [bullseye] - wolfssl 4.6.0+p1-0+deb11u2
+CVE-2022-39173
+ [bullseye] - wolfssl 4.6.0+p1-0+deb11u2
+CVE-2022-42905
+ [bullseye] - wolfssl 4.6.0+p1-0+deb11u2
+CVE-2022-46175
+ [bullseye] - node-json5 2.1.3-2+deb11u1
+CVE-2022-24859
+ [bullseye] - pypdf2 1.26.0-4+deb11u1
+CVE-2022-48279
+ [bullseye] - modsecurity-apache 2.9.3-3+deb11u2
+CVE-2023-24021
+ [bullseye] - modsecurity-apache 2.9.3-3+deb11u2
+CVE-2022-21222
+ [bullseye] - node-css-what 4.0.0-3+deb11u1
+CVE-2021-33587
+ [bullseye] - node-css-what 4.0.0-3+deb11u1
+CVE-2021-22569
+ [bullseye] - protobuf 3.12.4-1+deb11u1
+CVE-2021-22570
+ [bullseye] - protobuf 3.12.4-1+deb11u1
+CVE-2022-1941
+ [bullseye] - protobuf 3.12.4-1+deb11u1
+CVE-2023-0842
+ [bullseye] - node-xml2js 0.2.8-1+deb11u1
+CVE-2023-29197
+ [bullseye] - php-guzzlehttp-psr7 1.7.0-1+deb11u2
+ [bullseye] - php-nyholm-psr7 1.3.2-2+deb11u1
+CVE-2021-45423
+ [bullseye] - pev 0.81-3+deb11u1
+CVE-2023-24291
+ [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-2428
+ [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-24287
+ [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-24285
+ [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-24284
+ [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-24283
+ [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
+CVE-2023-27533
+ [bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2023-27534
+ [bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2023-27535
+ [bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2023-27536
+ [bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2023-27538
+ [bullseye] - curl 7.74.0-1.3+deb11u8
+CVE-2021-33797
+ [bullseye] - mujs 1.1.0-1+deb11u3
+CVE-2023-29491
+ [bullseye] - ncurses 6.2+20201114-2+deb11u2
+CVE-2022-0512
+ [bullseye] - node-url-parse 1.5.3-1+deb11u2
+CVE-2022-1537
+ [bullseye] - grunt 1.3.0-1+deb11u2
+CVE-2023-30570
+ [bullseye] - libreswan 4.3-1+deb11u4
+CVE-2022-47015
+ [bullseye] - mariadb-10.5 1:10.5.20-0+deb11u1
+CVE-2023-28617
+ [bullseye] - org-mode 9.4.0+dfsg-1+deb11u1
+CVE-2021-3574
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-4219
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20241
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20243
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20244
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20245
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20246
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-20309
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2021-39212
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-1114
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-28463
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-32545
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2022-32546
+ [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
+CVE-2023-34969
+ [bullseye] - dbus 1.12.28-0+deb11u1
diff --git a/data/next-point-update.txt b/data/next-point-update.txt
index 80596df300..e69de29bb2 100644
--- a/data/next-point-update.txt
+++ b/data/next-point-update.txt
@@ -1,119 +0,0 @@
-CVE-2022-3650
- [bullseye] - ceph 14.2.21-1+deb11u1
-CVE-2021-32718
- [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-32719
- [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-22116
- [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2018-1279
- [bullseye] - rabbitmq-server 3.8.9-3+deb11u1
-CVE-2021-3654
- [bullseye] - nova 2:22.2.2-1+deb11u1
-CVE-2022-27240
- [bullseye] - glewlwyd 2.5.2-2+deb11u3
-CVE-2022-29967
- [bullseye] - glewlwyd 2.5.2-2+deb11u3
-CVE-2022-32096
- [bullseye] - rhonabwy 0.9.13-3+deb11u2
-CVE-2021-24119
- [bullseye] - mbedtls 2.16.12-0+deb11u1
-CVE-2021-44732
- [bullseye] - mbedtls 2.16.12-0+deb11u1
-CVE-2022-2996
- [bullseye] - python-scciclient 0.8.0-2+deb11u1
-CVE-2022-42961
- [bullseye] - wolfssl 4.6.0+p1-0+deb11u2
-CVE-2022-39173
- [bullseye] - wolfssl 4.6.0+p1-0+deb11u2
-CVE-2022-42905
- [bullseye] - wolfssl 4.6.0+p1-0+deb11u2
-CVE-2022-46175
- [bullseye] - node-json5 2.1.3-2+deb11u1
-CVE-2022-24859
- [bullseye] - pypdf2 1.26.0-4+deb11u1
-CVE-2022-48279
- [bullseye] - modsecurity-apache 2.9.3-3+deb11u2
-CVE-2023-24021
- [bullseye] - modsecurity-apache 2.9.3-3+deb11u2
-CVE-2022-21222
- [bullseye] - node-css-what 4.0.0-3+deb11u1
-CVE-2021-33587
- [bullseye] - node-css-what 4.0.0-3+deb11u1
-CVE-2021-22569
- [bullseye] - protobuf 3.12.4-1+deb11u1
-CVE-2021-22570
- [bullseye] - protobuf 3.12.4-1+deb11u1
-CVE-2022-1941
- [bullseye] - protobuf 3.12.4-1+deb11u1
-CVE-2023-0842
- [bullseye] - node-xml2js 0.2.8-1+deb11u1
-CVE-2023-29197
- [bullseye] - php-guzzlehttp-psr7 1.7.0-1+deb11u2
- [bullseye] - php-nyholm-psr7 1.3.2-2+deb11u1
-CVE-2021-45423
- [bullseye] - pev 0.81-3+deb11u1
-CVE-2023-24291
- [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-2428
- [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-24287
- [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-24285
- [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-24284
- [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-24283
- [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1
-CVE-2023-27533
- [bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2023-27534
- [bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2023-27535
- [bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2023-27536
- [bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2023-27538
- [bullseye] - curl 7.74.0-1.3+deb11u8
-CVE-2021-33797
- [bullseye] - mujs 1.1.0-1+deb11u3
-CVE-2023-29491
- [bullseye] - ncurses 6.2+20201114-2+deb11u2
-CVE-2022-0512
- [bullseye] - node-url-parse 1.5.3-1+deb11u2
-CVE-2022-1537
- [bullseye] - grunt 1.3.0-1+deb11u2
-CVE-2023-30570
- [bullseye] - libreswan 4.3-1+deb11u4
-CVE-2022-47015
- [bullseye] - mariadb-10.5 1:10.5.20-0+deb11u1
-CVE-2023-28617
- [bullseye] - org-mode 9.4.0+dfsg-1+deb11u1
-CVE-2021-3574
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-4219
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20241
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20243
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20244
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20245
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20246
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-20309
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2021-39212
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2022-1114
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2022-28463
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2022-32545
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2022-32546
- [bullseye] - imagemagick 8:6.9.11.60+dfsg-1.3+deb11u2
-CVE-2023-34969
- [bullseye] - dbus 1.12.28-0+deb11u1

© 2014-2024 Faster IT GmbH | imprint | privacy policy