Package: busybox Version: 1:1.30.1-7+b1 Severity: important Tags: security upstream fixed-upstream X-Debbugs-Cc: Debian Security Team <t...@security.debian.org>
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 https://security-tracker.debian.org/tracker/source-package/busybox already shows them. I learned it through https://thehackernews.com/2021/11/14-new-security-flaws-found-in-busybox.html which indicates they have all been fixed in version 1.34, but upstream also has 1.34.1. This is also a request for a new upstream version, but due to the security fixes, I made the severity 'important' like bug #985674. Cheers, Diederik - -- System Information: Debian Release: bookworm/sid APT prefers unstable-debug APT policy: (500, 'unstable-debug'), (500, 'testing-debug'), (500, 'unstable'), (500, 'testing'), (101, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: arm64 Kernel: Linux 5.14.0-4-amd64 (SMP w/16 CPU threads) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages busybox depends on: ii libc6 2.32-4 busybox recommends no packages. busybox suggests no packages. - -- no debconf information -----BEGIN PGP SIGNATURE----- iHUEARYIAB0WIQT1sUPBYsyGmi4usy/XblvOeH7bbgUCYY6OFQAKCRDXblvOeH7b biIrAQDEY0MCuFS7FFhp6ivPG7/BMf/yL8WuQRnVQrvV4mbi2wD+P8hajCNFE++6 fpBcTvu8uNnwWPBeUtRIdWpPBTXNcQk= =tqra -----END PGP SIGNATURE-----