Skip to content
Commits on Source (9)
......@@ -12,7 +12,7 @@ MIRROR = http://debian.csail.mit.edu/debian
SECURITY_MIRROR = http://security.debian.org/debian-security
wheezy_ARCHS = amd64 armel armhf i386
jessie_ARCHS = amd64 arm64 armel armhf i386 mips mipsel powerpc ppc64el s390x
jessie_ARCHS = amd64 armel armhf i386
stretch_ARCHS = amd64 arm64 armel armhf i386 mips mips64el mipsel ppc64el s390x
buster_ARCHS = amd64 arm64 armel armhf i386 mips mips64el mipsel ppc64el s390x
sid_ARCHS = amd64 arm64 armel armhf hurd-i386 i386 kfreebsd-i386 kfreebsd-amd64 mips mips64el mipsel powerpc ppc64el s390x
......
......@@ -20,7 +20,7 @@
set -eu
include_oldstable=true
include_oldstable=false
turl="https://security-tracker.debian.org/tracker/status/release"
[ -f data/dsa-needed.txt ] || {
......
......@@ -3,15 +3,15 @@ To: debian-lts-announce@lists.debian.org
Subject: [SECURITY] [DLA $DLAID] $PACKAGE security update
Package : $PACKAGE
Version : $wheezy_VERSION
Version : $jessie_VERSION
CVE ID : $CVE
Debian Bug : $BUGNUM
$TEXT
For Debian 7 "Wheezy", these problems have been fixed in version
$wheezy_VERSION.
For Debian 8 "Jessie", these problems have been fixed in version
$jessie_VERSION.
We recommend that you upgrade your $PACKAGE packages.
......
......@@ -14,9 +14,6 @@ Debian Bug : $BUGNUM
$TEXT
For the oldstable distribution ($OLDSTABLE), this problem has been fixed
in version $$OLDSTABLE_VERSION.
For the stable distribution ($STABLE), this problem has been fixed in
version $$STABLE_VERSION.
......
<table style="margin: 0 auto 0 auto;width: 100%;text-align:center;">
<tbody>
<tr><th>Jessie 8</th><th>Stretch 9</th><th>Buster</th><th>Sid</th></tr>
<tr><th>jessie-security</th><th>stretch-security</th><th>testing</th><th>unstable</th></tr>
<tr><th>Stretch 9</th><th>Buster</th><th>Sid</th></tr>
<tr><th>stretch-security</th><th>testing</th><th>unstable</th></tr>
<tr>
</td><td valign="top">
<a href="https://security-tracker.debian.org/tracker/status/release/oldstable">Vulnerable Packages</a><br\>
</td><td valign="top">
<a href="https://security-tracker.debian.org/tracker/status/release/stable">Vulnerable Packages</a><br\>
</td><td valign="top">
......@@ -13,8 +11,6 @@
<a href="https://security-tracker.debian.org/tracker/status/release/unstable">Vulnerable Packages</a><br\>
</td></tr>
<tr><td valign="top">
<a href="https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/next-oldstable-point-update.txt">Next point update</a><br\>
</td><td valign="top">
<a href="https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/next-point-update.txt">Next point update</a><br\>
</td><td valign="top">
Next point update<br\>
......
......@@ -40,7 +40,7 @@ def apply_config():
common_archs = 'amd64,armel,i386,mips,mipsel,powerpc'.split(',')
squeeze_archs = common_archs + ['s390','ia64','kfreebsd-amd64','kfreebsd-i386','sparc' ]
wheezy_archs = [ 'amd64','armel','armhf','i386' ]
jessie_archs = common_archs + [ 'arm64','armhf','ppc64el' ]
jessie_archs = [ 'amd64','armel','armhf','i386' ]
stretch_archs = [ 'amd64','arm64','armel','armhf','i386','mips','mips64el','mipsel','ppc64el','s390x' ]
buster_archs = [ 'amd64','arm64','armel','armhf','i386','mips','mips64el','mipsel','ppc64el','s390x' ]
sid_archs = [ 'amd64','arm64','armel','armhf','i386','mips','mips64el','mipsel','ppc64el','s390x' ]
......
{
"wheezy": {
"major-version": "7",
"support": "lts",
"contact": "debian-lts@lists.debian.org"
"support": "none",
"contact": ""
},
"jessie": {
"major-version": "8",
"support": "security",
"contact": "team@security.debian.org"
"support": "lts",
"contact": "debian-lts@lists.debian.org"
},
"stretch": {
"major-version": "9",
......
Content-Type: text/plain; charset=utf-8
To: {{ to }}
Cc: {{ cc }}
Subject: About the security issues affecting {{ package }} in Wheezy
Subject: About the security issues affecting {{ package }} in Jessie
Dear maintainer(s),
The Debian LTS team recently reviewed the security issue(s) affecting your
package in Wheezy:
package in Jessie:
{%- if cve -%}
{% for entry in cve %}
https://security-tracker.debian.org/tracker/{{ entry }}
......
Content-Type: text/plain; charset=utf-8
To: {{ to }}
Cc: {{ cc }}
Subject: Wheezy update of {{ package }}?
Subject: Jessie update of {{ package }}?
Dear maintainer(s),
The Debian LTS team would like to fix the security issues which are
currently open in the Wheezy version of {{ package }}:
currently open in the Jessie version of {{ package }}:
{%- if cve -%}
{% for entry in cve %}
https://security-tracker.debian.org/tracker/{{ entry }}
......