During the month of February 2023 and on behalf of Freexian, I worked on the
following:

  * DLA-3336-1 for node-url-parse=1.2.0-2+deb10u2
    CVE-2021-3664, CVE-2021-27515, CVE-2022-0512, CVE-2022-0639,
    CVE-2022-0686 and CVE-2022-0691
    https://lists.debian.org/msgid-search/?m=Y/a5cbemzr3li...@debian.org

  * DLA-3344-1 for nodejs=10.24.0~dfsg-1~deb10u3
    CVE-2022-43548 and CVE-2023-23920
    https://lists.debian.org/msgid-search/?m=Y/qzlst0te1eq...@debian.org

  * DLA-3345-1 for php7.3=7.3.31-1~deb10u3
    CVE-2022-31631, CVE-2023-0567, CVE-2023-0568 and CVE-2023-0662
    https://lists.debian.org/msgid-search/?m=Y/vwcggwy7trj...@debian.org

  * DLA-3347-1 for spip=3.2.4-1+deb10u10
    CVE-2023-24258 and CVE-2023-27372 (DLA sent before the CVE IDs were
    assigned)
    https://lists.debian.org/msgid-search/?m=Y/0ow1d5ll7vp...@debian.org

  * DLA-3348-1 for syslog-ng=3.19.1-5+deb10u1
    CVE-2022-38725
    https://lists.debian.org/msgid-search/?m=Y/6o8zqo9zx8e...@debian.org

Thanks to the sponsors for financing the above, and to Freexian for
coordinating!
-- 
Guilhem.

Attachment: signature.asc
Description: PGP signature

Reply via email to