summaryrefslogtreecommitdiffstats
path: root/data/dsa-needed.txt
blob: f01e1312fae119358bc991536ee05a861fb85657 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
A DSA is needed for the following source packages in old/stable. The specific
CVE IDs do not need to be listed, they can be gathered in an up-to-date manner from
https://security-tracker.debian.org/tracker/source-package/SOURCEPACKAGE
when working on an update.

Some packages are not tracked here:
- Linux kernel (tracking in kernel-sec repo)
- Embargoed issues continue to be tracked in separate file.

To pick an issue, simply add your uid behind it.

If needed, specify the release by adding a slash after the name of the source package.

--
condor
--
chromium
--
djvulibre
--
faad2/oldstable (jmm)
--
firefox-esr
  Rust toolchain updates needed
--
gpac (jmm)
--
linux (carnil)
  Wait until more issues have piled up, though try to regulary rebase for point
  releases to more recent v4.19.y versions.
--
ndpi/oldstable
--
nodejs (jmm)
--
puppetdb (jmm)
--
python-pysaml2 (jmm)
--
rabbitmq-server
--
runc
--
samba/oldstable (carnil)
  We will likely only address the 'min domain uid' patch, the fixes for the CVEs
  are otherwise quite intrusive.
--
sogo
  Maintainer preparing updates
--
thunderbird (jmm)
  Rust toolchain updates needed
--
trafficserver (jmm)
  wait until status for CVE-2021-38161 is clarified (upstream patch got reverted)
--
varnish
--
wireshark
--
xen
  Maintainer proposed an update, but might be very well as well an option via point release
  given the timeline and the kernel upgrade pending.
--

© 2014-2024 Faster IT GmbH | imprint | privacy policy