summaryrefslogtreecommitdiffstats
path: root/data/dsa-needed.txt
blob: 328ba3ab8b4d7612ecb19fb09dcaab6e2edf225b (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
A DSA is needed for the following source packages in old/stable. The specific
CVE IDs do not need to be listed, they can be gathered in an up-to-date manner from
https://security-tracker.debian.org/tracker/source-package/SOURCEPACKAGE
when working on an update.

Some packages are not tracked here:
- Linux kernel (tracking in kernel-sec repo)
- Embargoed issues continue to be tracked in separate file.

To pick an issue, simply add your uid behind it.

If needed, specify the release by adding a slash after the name of the source package.

--
asterisk/oldstable
--
condor
--
faad2/oldstable (jmm)
--
flatpak (seb)
  2022-01-12: maintainer prepared updates
--
librecad
--
linux (carnil)
  Wait until more issues have piled up, though try to regulary rebase for point
  releases to more recent v4.19.y versions.
--
ndpi/oldstable
--
nss
--
nodejs (jmm)
--
openjdk-11 (jmm)
--
openjdk-17 (jmm)
--
pillow (jmm)
--
python-pysaml2 (jmm)
--
rpki-client/stable
  new 7.6 release required libretls, which isn't in Bullseye
--
ruby2.5/oldstable
  Maintainer is preparing updates
--
ruby2.7/stable
  Maintainer is preparing updates
--
runc
--
trafficserver (jmm)
  wait until status for CVE-2021-38161 is clarified (upstream patch got reverted)
--
uriparser
--
varnish (fw)
--

© 2014-2024 Faster IT GmbH | imprint | privacy policy