blob: c851e84430b8e29f3db7c03b9dfabddd02e493dd (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
|
A DSA is needed for the following source packages in old/stable. The specific
CVE IDs do not need to be listed, they can be gathered in an up-to-date manner from
https://security-tracker.debian.org/tracker/source-package/SOURCEPACKAGE
when working on an update.
Some packages are not tracked here:
- Linux kernel (tracking in kernel-sec repo)
- Embargoed issues continue to be tracked in separate file.
To pick an issue, simply add your uid behind it.
If needed, specify the release by adding a slash after the name of the source package.
--
asterisk/oldstable
--
condor
--
chromium
--
djvulibre
--
faad2/oldstable (jmm)
--
firefox-esr
Rust toolchain updates needed
--
gpac (jmm)
--
linux (carnil)
Wait until more issues have piled up, though try to regulary rebase for point
releases to more recent v4.19.y versions.
--
modsecurity-apache
Maintainer working on updates, needs review (decision on modsecurity)
--
ndpi/oldstable
--
nodejs (jmm)
--
openjdk-11/oldstable (jmm)
blocked on pending jtreg/jtharness updates
--
puppetdb (jmm)
--
python-pysaml2 (jmm)
--
rabbitmq-server
--
runc
--
sogo
Maintainer preparing updates
--
thunderbird (jmm)
Rust toolchain updates needed
--
trafficserver (jmm)
wait until status for CVE-2021-38161 is clarified (upstream patch got reverted)
--
varnish
--
wireshark
--
xen
Maintainer proposed an update, but might be very well as well an option via point release
given the timeline and the kernel upgrade pending.
--
|