blob: 254c5e12f2022719a37dda58f808fa93c4cccf8f (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
|
A DSA is needed for the following source packages in old/stable. The specific
CVE IDs do not need to be listed, they can be gathered in an up-to-date manner from
https://security-tracker.debian.org/tracker/source-package/SOURCEPACKAGE
when working on an update.
Some packages are not tracked here:
- Linux kernel (tracking in kernel-sec repo)
- Embargoed issues continue to be tracked in separate file.
To pick an issue, simply add your uid behind it.
If needed, specify the release by adding a slash after the name of the source package.
--
ansible
--
chromium
--
firefox-esr (jmm)
--
knot-resolver
Santiago Ruano Rincón proposed a debdiff for review
--
linux (carnil)
Wait until more issues have piled up, though try to regulary rebase for point
releases to more recent v4.19.y versions.
--
netty
--
php-pear (carnil)
--
python-apt (carnil)
Regression fix, #977000
--
salt
--
slurm-llnl (jmm)
--
sympa
Reconsider the no-dsa/publish via point release decision, Sylvain has
proposed debdiff for review.
--
xcftools
Hugo proposed to work on this update
--
xerces-c (seb)
Sylvain Beucler proposed an update, but the test fails on 32bit
architectures so we'll need another pass at the test suite
--
|