blob: f670668f1ea131e33c9bb3bd256017a539766eed (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
|
A DSA is needed for the following source packages in old/stable. The specific
CVE IDs do not need to be listed, they can be gathered in an up-to-date manner from
https://security-tracker.debian.org/tracker/source-package/SOURCEPACKAGE
when working on an update.
Some packages are not tracked here:
- Linux kernel (tracking in kernel-sec repo)
- Embargoed issues continue to be tracked in separate file.
To pick an issue, simply add your uid behind it.
If needed, specify the release by adding a slash after the name of the source package.
--
asterisk/oldstable
--
chromium (jmm)
--
condor
--
faad2/oldstable (jmm)
--
librecad
--
linux (carnil)
Wait until more issues have piled up, though try to regulary rebase for point
releases to more recent v4.19.y versions.
--
ndpi/oldstable
--
nss
--
nodejs (jmm)
--
openjdk-11 (jmm)
--
openjdk-17 (jmm)
--
python-pysaml2 (jmm)
--
rpki-client/stable
new 7.6 release required libretls, which isn't in Bullseye
--
ruby2.5/oldstable
Maintainer is preparing updates
--
ruby2.7/stable
Maintainer is preparing updates
--
runc
--
trafficserver (jmm)
wait until status for CVE-2021-38161 is clarified (upstream patch got reverted)
--
uriparser
--
varnish (fw)
--
|