From 027c1e33dae1363b3665b1b0d5444526a91da201 Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Fri, 6 Oct 2023 22:58:33 +0200 Subject: Merge changes for updates with CVEs via bullseye 11.8 --- data/next-oldstable-point-update.txt | 162 ----------------------------------- 1 file changed, 162 deletions(-) (limited to 'data/next-oldstable-point-update.txt') diff --git a/data/next-oldstable-point-update.txt b/data/next-oldstable-point-update.txt index 8456a25724..768ff4c914 100644 --- a/data/next-oldstable-point-update.txt +++ b/data/next-oldstable-point-update.txt @@ -1,167 +1,5 @@ -CVE-2022-46175 - [bullseye] - node-json5 2.1.3-2+deb11u1 -CVE-2022-21222 - [bullseye] - node-css-what 4.0.0-3+deb11u1 -CVE-2021-33587 - [bullseye] - node-css-what 4.0.0-3+deb11u1 -CVE-2021-22569 - [bullseye] - protobuf 3.12.4-1+deb11u1 -CVE-2021-22570 - [bullseye] - protobuf 3.12.4-1+deb11u1 -CVE-2022-1941 - [bullseye] - protobuf 3.12.4-1+deb11u1 -CVE-2023-29197 - [bullseye] - php-guzzlehttp-psr7 1.7.0-1+deb11u2 - [bullseye] - php-nyholm-psr7 1.3.2-2+deb11u1 -CVE-2021-45423 - [bullseye] - pev 0.81-3+deb11u1 -CVE-2023-24291 - [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1 -CVE-2023-24288 - [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1 -CVE-2023-24287 - [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1 -CVE-2023-24285 - [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1 -CVE-2023-24284 - [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1 -CVE-2023-24283 - [bullseye] - sgt-puzzles 20191231.79a5378-3+deb11u1 -CVE-2023-27533 - [bullseye] - curl 7.74.0-1.3+deb11u8 -CVE-2023-27534 - [bullseye] - curl 7.74.0-1.3+deb11u8 -CVE-2023-27535 - [bullseye] - curl 7.74.0-1.3+deb11u8 -CVE-2023-27536 - [bullseye] - curl 7.74.0-1.3+deb11u8 -CVE-2023-27538 - [bullseye] - curl 7.74.0-1.3+deb11u8 -CVE-2021-33797 - [bullseye] - mujs 1.1.0-1+deb11u3 -CVE-2023-29491 - [bullseye] - ncurses 6.2+20201114-2+deb11u2 -CVE-2022-1537 - [bullseye] - grunt 1.3.0-1+deb11u2 -CVE-2023-30570 - [bullseye] - libreswan 4.3-1+deb11u4 -CVE-2022-47015 - [bullseye] - mariadb-10.5 1:10.5.20-0+deb11u1 -CVE-2023-28617 - [bullseye] - org-mode 9.4.0+dfsg-1+deb11u1 -CVE-2023-34969 - [bullseye] - dbus 1.12.28-0+deb11u1 -CVE-2023-34241 - [bullseye] - cups 2.3.3op2-3+deb11u3 -CVE-2023-32324 - [bullseye] - cups 2.3.3op2-3+deb11u3 -CVE-2023-4504 - [bullseye] - cups 2.3.3op2-3+deb11u4 -CVE-2023-32360 - [bullseye] - cups 2.3.3op2-3+deb11u4 -CVE-2023-33460 - [bullseye] - yajl 2.1.0-3+deb11u2 -CVE-2017-16516 - [bullseye] - yajl 2.1.0-3+deb11u2 -CVE-2022-24795 - [bullseye] - yajl 2.1.0-3+deb11u2 -CVE-2019-6706 - [bullseye] - lua5.3 5.3.3-1.1+deb11u1 -CVE-2020-24370 - [bullseye] - lua5.3 5.3.3-1.1+deb11u1 -CVE-2023-25516 - [bullseye] - nvidia-graphics-drivers-tesla-470 470.199.02-1 - [bullseye] - nvidia-graphics-drivers-tesla-450 450.248.02-1~deb11u1 - [bullseye] - nvidia-graphics-drivers 470.199.02-1 -CVE-2023-25515 - [bullseye] - nvidia-graphics-drivers-tesla-470 470.199.02-1 - [bullseye] - nvidia-graphics-drivers-tesla-450 450.248.02-1~deb11u1 - [bullseye] - nvidia-graphics-drivers 470.199.02-1 -CVE-2023-1672 - [bullseye] - tang 8-3+deb11u2 CVE-2023-XXXX [spip: Use a dedicated function to clean author data when preparing a session] [bullseye] - spip 3.2.11-3+deb11u9 -CVE-2023-37365 - [bullseye] - hnswlib 0.4.0-3+deb11u1 -CVE-2023-35936 - [bullseye] - pandoc 2.9.2.1-1+deb11u1 -CVE-2023-36054 - [bullseye] - krb5 1.18.3-6+deb11u4 -CVE-2022-30333 - [bullseye] - rar 2:6.20-0.1~deb11u1 -CVE-2023-40477 - [bullseye] - rar 2:6.23-1~deb11u1 - [bullseye] - unrar-nonfree 1:6.0.3-1+deb11u3 -CVE-2022-48579 - [bullseye] - unrar-nonfree 1:6.0.3-1+deb11u2 -CVE-2023-40303 - [bullseye] - inetutils 2:2.0-1+deb11u2 -CVE-2022-44729 - [bullseye] - batik 1.12-4+deb11u2 -CVE-2022-44730 - [bullseye] - batik 1.12-4+deb11u2 -CVE-2023-3446 - [bullseye] - openssl 1.1.1v-0~deb11u1 -CVE-2023-3817 - [bullseye] - openssl 1.1.1v-0~deb11u1 -CVE-2023-20197 - [bullseye] - clamav 0.103.9+dfsg-0+deb11u1 -CVE-2023-38408 - [bullseye] - openssh 1:8.4p1-5+deb11u2 -CVE-2022-45582 - [bullseye] - horizon 3:18.6.2-5+deb11u2 -CVE-2021-23336 - [bullseye] - python2.7 2.7.18-8+deb11u1 -CVE-2022-0391 - [bullseye] - python2.7 2.7.18-8+deb11u1 -CVE-2022-48560 - [bullseye] - python2.7 2.7.18-8+deb11u1 -CVE-2022-48565 - [bullseye] - python2.7 2.7.18-8+deb11u1 -CVE-2022-48566 - [bullseye] - python2.7 2.7.18-8+deb11u1 -CVE-2023-24329 - [bullseye] - python2.7 2.7.18-8+deb11u1 -CVE-2023-40217 - [bullseye] - python2.7 2.7.18-8+deb11u1 -CVE-2021-20196 - [bullseye] - qemu 1:5.2+dfsg-11+deb11u3 -CVE-2023-0330 - [bullseye] - qemu 1:5.2+dfsg-11+deb11u3 -CVE-2023-1544 - [bullseye] - qemu 1:5.2+dfsg-11+deb11u3 -CVE-2023-3354 - [bullseye] - qemu 1:5.2+dfsg-11+deb11u3 -CVE-2021-3930 - [bullseye] - qemu 1:5.2+dfsg-11+deb11u3 -CVE-2023-3180 - [bullseye] - qemu 1:5.2+dfsg-11+deb11u3 -CVE-2021-20203 - [bullseye] - qemu 1:5.2+dfsg-11+deb11u3 -CVE-2021-3507 - [bullseye] - qemu 1:5.2+dfsg-11+deb11u3 -CVE-2020-14394 - [bullseye] - qemu 1:5.2+dfsg-11+deb11u3 -CVE-2023-3301 - [bullseye] - qemu 1:5.2+dfsg-11+deb11u3 -CVE-2022-0216 - [bullseye] - qemu 1:5.2+dfsg-11+deb11u3 -CVE-2023-41081 - [bullseye] - libapache-mod-jk 1:1.2.48-1+deb11u1 -CVE-2023-43770 - [bullseye] - roundcube 1.4.14+dfsg.1-1~deb11u1 -CVE-2023-38559 - [bullseye] - ghostscript 9.53.3~dfsg-7+deb11u6 -CVE-2023-43115 - [bullseye] - ghostscript 9.53.3~dfsg-7+deb11u6 -CVE-2023-44469 - [bullseye] - lemonldap-ng 2.0.11+ds-4+deb11u5 -CVE-2021-38185 - [bullseye] - cpio 2.13+dfsg-7.1~deb11u1 -CVE-2023-28322 - [bullseye] - curl 7.74.0-1.3+deb11u9 -CVE-2023-28321 - [bullseye] - curl 7.74.0-1.3+deb11u9 CVE-2023-32665 [bullseye] - glib2.0 2.66.8-1+deb11u1 CVE-2023-32611 -- cgit v1.2.3