Navigation: Suites / Filters / Types / Fields / Sort / Format / Search / Results

Bugs search

Useful queries for testing (bullseye)

Suites[1]

Filters

off / include / exclude
  • tagged confirmed
  • tagged patch
  • tagged pending
  • tagged security
  • tagged wontfix
  • tagged moreinfo
  • tagged upstream
  • tagged unreproducible
  • tagged help
  • tagged d-i
  • forwarded upstream
  • claimed bugs
  • fixed in deferred/delayed
  • packages not in main
  • packages not in jessie
  • packages not in stretch
  • packages not in buster
  • packages not in bullseye
  • packages in base system
  • packages in standard installation
  • orphaned packages
  • merged bugs
  • marked as done
  • outdated binaries in jessie
  • outdated binaries in stretch
  • outdated binaries in buster
  • outdated binaries in bullseye
  • outdated binaries in sid
  • different versions in bullseye and sid
  • newer in Ubuntu than in sid
  • RT tag for jessie: ignore
  • RT tag for jessie: will-remove
  • RT tag for jessie: can-defer
  • RT tag for jessie: is-blocker
  • RT tag for jessie: no-auto-remove
  • RT tag for jessie: pu
  • RT tag for stretch: ignore
  • RT tag for stretch: will-remove
  • RT tag for stretch: can-defer
  • RT tag for stretch: is-blocker
  • RT tag for stretch: no-auto-remove
  • RT tag for stretch: pu
  • RT tag for buster: ignore
  • RT tag for buster: will-remove
  • RT tag for buster: can-defer
  • RT tag for buster: is-blocker
  • RT tag for buster: no-auto-remove
  • RT tag for buster: pu
  • RT tag for bullseye: ignore
  • RT tag for bullseye: will-remove
  • RT tag for bullseye: can-defer
  • RT tag for bullseye: is-blocker
  • RT tag for bullseye: no-auto-remove
  • RT tag for bullseye: pu
  • RT unblock hint
  • key packages
  • pseudo packages
  • packages marked for autoremoval
  • closed in packages in new
  • newer than days
  • modified in the last days

Bugs or packages selection


  ignore:
  ignore:
  ignore:
 
 

Additional fields

Sort

Format

30 bugs found

bug# tags package title popcon severity modified
#934957 [P|S|u]   src:cups cups: multiple security issues (including CVEified CVE-2019-8675 and CVE-2019-8696) 168809 6 grave 2019-08-21
#933002 [U|S|u]   src:docker.io docker.io: CVE-2019-13139 2055 6 grave 2019-08-18
#933185 [P|S]   fai-server fai-server: /etc/fai/apt/sources.list should not contain trusted=yes to skip GPG verification 709 6 grave 2019-08-16
#928282 [+|S|u]   src:filezilla filezilla: CVE-2019-5429 11001 6 grave 2019-06-09
#919914 [M|+|S]   gnome-settings-daemon gnome-tweaks now equates "don't suspend on lid close" with "don't lock on lid close" (security issue) 59777 6 grave 2019-04-29
#934954 [S|u]   src:golang-1.13 golang-1.13: CVE-2019-14809 2 6 grave 2019-08-17
#934955 [S|u]   src:golang-1.13 golang-1.13: CVE-2019-9512 CVE-2019-9514 2 6 grave 2019-08-17
#934886 [S|u]   src:h2o CVE-2019-9512 CVE-2019-9514 CVE-2019-9515 18 6 grave 2019-08-21
#934268 [+|S|u]   src:kde4libs kde4libs: CVE-2019-14744 32608 6 grave 2019-08-08
#933917 [S]   src:knot src:knot: Unsafe use of yaml.load() 299 6 grave 2019-08-05
#932048 [S|u]   src:knot-resolver knot-resolver: CVE-2019-10190 CVE-2019-10191 33 6 grave 2019-07-14
#933918 [S]   src:lava src:lava: Unsafe use of yaml.load() 18 6 grave 2019-08-05
#933919 [S]   src:lavacli src:lavacli: Unsafe use of yaml.load() 13 6 grave 2019-08-05
#934766 [S|u]   src:libexosip2 libexosip2: CVE-2014-10375 1015 6 grave 2019-08-14
#924609 [+|S|u]   src:libsdl1.2 libsdl1.2: Multiple security issues 105367 6 grave 2019-04-29
#924610 [+|S|u]   src:libsdl2 libsdl2: Multiple security issues 49526 6 grave 2019-04-29
#934966 [U|S|u]   src:libstb libstb: CVE-2019-13217 CVE-2019-13218 CVE-2019-13219 CVE-2019-13220 CVE-2019-13221 CVE-2019-13222 CVE-2019-13223 663 6 grave 2019-08-17
#862373 [bus-i|C|U|S]   libyaml-libyaml-perl libyaml-libyaml-perl: Unconditionally instantiates objects from yaml data 30782 6 grave 2019-03-11
#862475 [bus-i|C|S]   libyaml-syck-perl libyaml-syck-perl: Unconditionally instantiates objects from yaml data 9827 6 grave 2019-03-11
#930527 [S]   src:linux linux-image-4.19.0-5-amd64: when logging out, not the whole screen is erased, leaving private information 120956 6 grave 2019-06-14
#934160 [S]   nfs-common nfs-common: Umask ignored, all files created world-writable on NFS 82298 6 grave 2019-08-07
#934885 [S]   nodejs August 2019 security release 36672 6 grave 2019-08-16
#931654 [bul|S|sid|u]   node-json3 node-json3: json3 is no more maintained 25 6 grave 2019-07-09
#933674 [+|S|u]   pump Buffer overflow during processing of large server replies in "pump" 802 6 grave 2019-08-09
#933741 [S|u]   src:qemu qemu: CVE-2019-14378: heap buffer overflow during packet reassembly 19125 6 grave 2019-08-02
#934802 [U|S|u]   src:ruby-nokogiri ruby-nokogiri: CVE-2019-5477: command injection vulnerability 5402 6 grave 2019-08-19
#933922 [S]   src:salt src:salt: Unsafe use of yaml.load() 2467 6 grave 2019-08-05
#928052 [U|+|S|u]   src:snapd CVE-2019-11502 CVE-2019-11503 5435 6 grave 2019-06-10
#934887 [S|u]   src:trafficserver CVE-2019-9512 CVE-2019-9514 CVE-2019-9515 20 6 grave 2019-08-16
#830726 [+|S|u]   xtrlock xtrlock: CVE-2016-10894: xtrlock does not block multitouch events 612 6 grave 2019-08-20

Generated in 1.876 seconds.

select id, bugs.package, bugs.source, severity, title, last_modified, affects_stable, affects_testing, affects_unstable, affects_experimental , coalesce(popcon_src.insts, 0) as popcon
from bugs  left join popcon_src on (bugs.source = popcon_src.source) 
where id in (select id from bugs_rt_affects_testing) 
and id in (select id from bugs_tags where tag='security') 
AND (severity >= 'serious')
order by source asc