Among the 30 debian patches available in version 1:3.5.1-11 of the package, we noticed the following issues:
commit c56d4af6f576ce0426c469192ce7adb420e5ac24
Author: Jose M Calhariz <calhariz@debian.org>
Date: Tue Mar 21 17:37:26 2023 +0000
Preparing to upload to sid.
commit 3c663c9e9d6f5dc5771b02114e231849eebe4943
Author: Jose M Calhariz <calhariz@debian.org>
Date: Sun Mar 5 00:32:31 2023 +0000
WIP CVE-2022-37705 part 2
commit ae16fd35d13e04cfbbc88c515ea196f78f4fc1dc
Author: Jose M Calhariz <calhariz@debian.org>
Date: Sun Mar 5 00:29:55 2023 +0000
Fix the patch, was wrongly applied.
commit c47e0e359ee284d477af5812e7c05b530c515827
Author: Jose M Calhariz <calhariz@debian.org>
Date: Sat Mar 4 23:55:14 2023 +0000
Preparing to release to sid.
commit 61032029bd7283c7b9d2a32f0b418e35a562ddbc
Author: Jose M Calhariz <calhariz@debian.org>
Date: Sat Mar 4 22:19:53 2023 +0000
WIP CVE-2022-37705 part 2
commit 83f1c0d5af0b09461bc7dda182f60eac0bcdb073
Author: Jose M Calhariz <calhariz@debian.org>
Date: Sat Mar 4 22:14:22 2023 +0000
Fix CVE-2022-37705 part 2
There are 3 open security issues in bullseye.
You can find information about how to handle these issues in the security team's documentation.