Navigation: Suites / Filters / Types / Fields / Sort / Format / Search / Results

Bugs search

Useful queries for testing (bookworm)

Suites[1]

Filters

off / include / exclude
  • tagged confirmed
  • tagged patch
  • tagged pending
  • tagged security
  • tagged wontfix
  • tagged moreinfo
  • tagged upstream
  • tagged unreproducible
  • tagged help
  • tagged d-i
  • forwarded upstream
  • claimed bugs
  • fixed in deferred/delayed
  • packages not in main
  • packages not in stretch
  • packages not in buster
  • packages not in bullseye
  • packages not in bookworm
  • packages in base system
  • packages in standard installation
  • orphaned packages
  • merged bugs
  • marked as done
  • outdated binaries in stretch
  • outdated binaries in buster
  • outdated binaries in bullseye
  • outdated binaries in bookworm
  • outdated binaries in sid
  • different versions in bookworm and sid
  • newer in Ubuntu than in sid
  • RT tag for stretch: ignore
  • RT tag for stretch: will-remove
  • RT tag for stretch: can-defer
  • RT tag for stretch: is-blocker
  • RT tag for stretch: no-auto-remove
  • RT tag for stretch: pu
  • RT tag for buster: ignore
  • RT tag for buster: will-remove
  • RT tag for buster: can-defer
  • RT tag for buster: is-blocker
  • RT tag for buster: no-auto-remove
  • RT tag for buster: pu
  • RT tag for bullseye: ignore
  • RT tag for bullseye: will-remove
  • RT tag for bullseye: can-defer
  • RT tag for bullseye: is-blocker
  • RT tag for bullseye: no-auto-remove
  • RT tag for bullseye: pu
  • RT tag for bookworm: ignore
  • RT tag for bookworm: will-remove
  • RT tag for bookworm: can-defer
  • RT tag for bookworm: is-blocker
  • RT tag for bookworm: no-auto-remove
  • RT tag for bookworm: pu
  • RT unblock hint
  • RT blocked
  • RT too young
  • RT ready to migrate
  • key packages
  • pseudo packages
  • packages marked for autoremoval
  • closed in packages in new
  • newer than days
  • modified in the last days
  • blocking bug
  • usertag for user

Bugs or packages selection


  ignore:
  ignore:
  ignore:
 
 

Additional fields

Sort

Format

20 bugs found

bug# tags package title popcon severity modified
#998206 [S]   calendar calendar: cronjob processes all users’ calendars as root, allowing information disclosure 146338 5 serious 2021-12-08
#922981 [P|S]   ca-certificates-java ca-certificates-java: /etc/ca-certificates/update.d/jks-keystore doesn't update /etc/ssl/certs/java/cacerts 78800 5 serious 2021-08-14
#992150 [S|u]   src:firefox-esr Please allow symlink in system extension 90304 5 serious 2021-08-16
#1002668 [S|u]   gif2apng gif2apng: CVE-2021-45909: Heap based buffer overflow in the DecodeLZW function 97 6 grave 2022-01-03
#1002667 [S|u]   gif2apng gif2apng: CVE-2021-45910: Heap based buffer overflow in the main function 97 6 grave 2022-01-03
#1002687 [S|u]   gif2apng gif2apng: CVE-2021-45911: Heap based buffer overflow in processing of delays in the main function 97 6 grave 2022-01-03
#919914 [bul-i|M|+|S]   gnome-settings-daemon gnome-tweaks now equates "don't suspend on lid close" with "don't lock on lid close" (security issue) 57210 6 grave 2021-04-10
#980071 [M|S]   gnome-shell gnome-shell: Using suspend in the gnome-shell power off/log out menu does log out and suspend in the wrong order 50854 6 grave 2021-08-14
#990691 [bul-i|U|S|u]   src:gpac gpac: CVE-2020-35980 1491 6 grave 2021-07-17
#1003894 [S|u]   src:h2database h2database: CVE-2021-42392 1001 6 grave 2022-01-17
#1004194 [S|u]   src:loguru loguru: CVE-2022-0329 2 6 grave 2022-01-22
#1004223 [+|S]   minetest-server minetest-server: ItemStack meta injection vulnerability in Minetest 5.3 1706 6 grave 2022-01-23
#972146 [S]   mono-runtime-common /usr/share/applications/mono-runtime-common.desktop: should not handle MIME type by executing arbitrary code 17110 6 grave 2021-11-10
#1004177 [S|u]   src:nodejs nodejs: CVE-2021-44531 CVE-2021-44532 CVE-2021-44533 CVE-2022-21824 34546 6 grave 2022-01-22
#1002901 [S|u]   node-request-capture-har node-request-capture-har is a wrapper around deprecated node-request 719 5 serious 2021-12-31
#991541 [bul-i|S|u]   src:php-pear php-pear: CVE-2021-32610: symbolic link path traversal 21448 6 grave 2022-01-08
#983206 [bul-i|U|S|u]   libupnp13 [libupnp13] Please update for CVE-2020-12695 & fixes 45890 6 grave 2021-09-28
#1002995 [S|u]   src:ruby3.0 ruby3.0: CVE-2021-41816 CVE-2021-41817 CVE-2021-41819 169 6 grave 2022-01-02
#1003190 [U|S|u]   src:tcpslice tcpslice: CVE-2021-41043: use-after-free in extract_slice() 54 6 grave 2022-01-10
#1004181 [S|u]   src:wolfssl wolfssl: CVE-2022-23408 56 6 grave 2022-01-22

Generated in 1.201 seconds.

select id, bugs.package, bugs.source, severity, title, last_modified, status, affects_stable, affects_testing, affects_unstable, affects_experimental , coalesce(popcon_src.insts, 0) as popcon
from bugs  left join popcon_src on (bugs.source = popcon_src.source) 
where id in (select id from bugs_rt_affects_testing) 
and id in (select id from bugs_tags where tag='security') 
AND (severity >= 'serious')
order by source asc