Bug #744

Updated by Pierre-Louis Bonicoli 7 months ago

From a security status mail received today:
Security report based on the bullseye release

*** Available security updates

CVE-2021-25219 In BIND 9.3.0 -&gt; 9.11.35, 9.12.0 -&gt; 9.16.21,...
- libdns-export1104, libisc-export1100

root@orthos:~# apt policy libdns-export1104
Installed: 1:9.11.5.P4+dfsg-5.1+deb10u3
Candidate: 1:9.11.5.P4+dfsg-5.1+deb10u3
Version table:
*** 1:9.11.5.P4+dfsg-5.1+deb10u3 100
100 /var/lib/dpkg/status

According to the [Debian security tracker]( @1:9.11.5.P4+dfsg-5.1+deb10u5@ is vulnerable. This package is buster only and should be removed.

I will remove every buster only (thanks to @apt-forktracer@).
* ▢ Elwing
* ▢ Jinta
* Nicecity (libffi6 libnettle6 libgcc1 libapt-pkg5.0 libip4tc0 gcc-8-base libmpx2 e2fslibs libcomerr2 libreadline7 libapt-inst2.0 linux-headers-4.19.0-5-common cpp-8 libip6tc0 multiarch-support linux-image-4.19.0-18-amd64 libisl19 libhogweed4 linux-kbuild-4.19)
* ▢ Orfeo
* ✅ Orthos (libapt-pkg5.0 libnettle6 libffi6 libprocps7 libjson-c3 libapt-inst2.0 gcc-8-base libip4tc0 libip6tc0 libhogweed4 perl-modules-5.28 libisc-export1100 libdns-export1104 linux-image-4.19.0-14-amd64
* ▢ Thorfinn
* ▢ Toushirou