A DSA is needed for the following source packages in old/stable. The specific CVE IDs do not need to be listed, they can be gathered in an up-to-date manner from https://security-tracker.debian.org/tracker/source-package/SOURCEPACKAGE when working on an update. Some packages are not tracked here: - Linux kernel (tracking in kernel-sec repo) - Embargoed issues continue to be tracked in separate file. To pick an issue, simply add your uid behind it. If needed, specify the release by adding a slash after the name of the source package. -- asterisk/oldstable -- condor -- chromium inactive, removal from stable likely -- djvulibre -- faad2/oldstable (jmm) -- firefox-esr (jmm) Rust toolchain updates needed -- linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v4.19.y versions. -- modsecurity-apache Maintainer working on updates, needs review (decision on modsecurity) -- ndpi/oldstable -- nodejs (jmm) -- openjdk-11/oldstable (jmm) blocked on pending jtreg/jtharness updates -- puppetdb (jmm) -- python-babel/oldstable (jmm) -- python-pysaml2 (jmm) -- rabbitmq-server -- runc -- sogo Maintainer preparing updates -- thunderbird (jmm) Rust toolchain updates needed -- trafficserver (jmm) wait until status for CVE-2021-38161 is clarified (upstream patch got reverted) -- varnish -- wireshark --