Skip to content
Commits on Source (16)
......@@ -2,10 +2,10 @@ PYTHON_MODULES = $(wildcard lib/python/*.py)
# The following variables need to be kept up-to-date and can be adjusted
# currently unsupported releases can be commented out
#OLDOLDSTABLE = wheezy
OLDSTABLE = jessie
STABLE = stretch
TESTING = buster
OLDOLDSTABLE = jessie
OLDSTABLE = stretch
STABLE = buster
TESTING = bullseye
MIRROR = http://debian.csail.mit.edu/debian
SECURITY_MIRROR = http://security.debian.org/debian-security
......@@ -13,6 +13,7 @@ SECURITY_MIRROR = http://security.debian.org/debian-security
jessie_ARCHS = amd64 armel armhf i386
stretch_ARCHS = amd64 arm64 armel armhf i386 mips mips64el mipsel ppc64el s390x
buster_ARCHS = amd64 arm64 armel armhf i386 mips mips64el mipsel ppc64el s390x
bullseye_ARCHS = amd64 arm64 armel armhf i386 mips mips64el mipsel ppc64el s390x
sid_ARCHS = amd64 arm64 armel armhf i386 mips mips64el mipsel ppc64el s390x
# The rest of the file should not need to be edited
......
......@@ -20,7 +20,7 @@
set -eu
include_oldstable=false
include_oldstable=true
turl="https://security-tracker.debian.org/tracker/status/release"
[ -f data/dsa-needed.txt ] || {
......
......@@ -27,10 +27,10 @@ case "$(basename "$0")" in
;;
esac
OLDOLDSTABLE=wheezy
OLDSTABLE=jessie
STABLE=stretch
TESTING=buster
OLDOLDSTABLE=jessie
OLDSTABLE=stretch
STABLE=buster
TESTING=bullseye
NAME_SPACING=24
DATE_SPACING=22
......
......@@ -32,6 +32,7 @@ release_mapping = {
'deb8': ('jessie', '2020-06-30'),
# End date not yet fixed
'deb9': ('stretch', None),
'deb10': ('buster', None),
}
......
......@@ -22,10 +22,10 @@ import requests
import six
RELEASES = {
'oldoldstable': 'wheezy',
'oldstable': 'jessie',
'stable': 'stretch',
'testing': 'buster',
'oldoldstable': 'jessie',
'oldstable': 'stretch',
'stable': 'buster',
'testing': 'bullseye',
'unstable': 'sid',
'experimental': 'experimental',
# LTS specific aliases
......
......@@ -882,19 +882,19 @@ to improve our documentation and procedures, so feedback is welcome.""")])])
return self.page_status_release_unstable_like(
path, params, url,
title='Vulnerable source packages among backports for stable',
rel='stretch-backports')
rel='buster-backports')
def page_status_release_oldstable_backports(self, path, params, url):
return self.page_status_release_unstable_like(
path, params, url,
title='Vulnerable source packages among backports for oldstable',
rel='jessie-backports')
rel='stretch-backports')
def page_status_release_oldoldstable_backports(self, path, params, url):
return self.page_status_release_unstable_like(
path, params, url,
title='Vulnerable source packages among backports for oldoldstable',
rel='wheezy-backports')
rel='jessie-backports')
def page_status_dtsa_candidates(self, path, params, url):
......@@ -909,11 +909,11 @@ to improve our documentation and procedures, so feedback is welcome.""")])])
(SELECT testing.version_id < stable.version_id
FROM source_packages AS testing, source_packages AS stable
WHERE testing.name = testing_status.package
AND testing.release = 'buster'
AND testing.release = 'bullseye'
AND testing.subrelease = ''
AND testing.archive = testing_status.section
AND stable.name = testing_status.package
AND stable.release = 'stretch'
AND stable.release = 'buster'
AND stable.subrelease = 'security'
AND stable.archive = testing_status.section),
(SELECT range_remote FROM nvd_data
......@@ -994,7 +994,7 @@ checker to find out why they have not entered testing yet."""),
old_pkg = ''
old_dsc = ''
last_displayed = ''
releases = ('sid', 'buster', 'stretch', 'jessie', 'wheezy')
releases = ('sid', 'bullseye', 'buster', 'stretch', 'jessie')
for (pkg_name, bug_name, release, desc) in self.db.cursor().execute(
"""SELECT DISTINCT sp.name, st.bug_name, sp.release,
bugs.description
......@@ -1039,7 +1039,7 @@ checker to find out why they have not entered testing yet."""),
old_dsc = ''
old_name = ''
last_displayed = ''
releases = ('sid', 'buster', 'stretch', 'jessie', 'wheezy')
releases = ('sid', 'bullseye', 'buster', 'stretch', 'jessie')
for (pkg_name, bug_name, release, desc) in self.db.cursor().execute(
"""SELECT DISTINCT sp.name, st.bug_name, sp.release,
bugs.description
......@@ -1325,7 +1325,7 @@ Debian bug number.'''),
urgency = defaultdict(lambda: defaultdict(dict))
nodsa = defaultdict(lambda: defaultdict(dict))
nodsa_reason = defaultdict(lambda: defaultdict(dict))
supported_releases = ('sid', 'buster', 'stretch', 'jessie', 'wheezy')
supported_releases = ('sid', 'bullseye', 'buster', 'stretch', 'jessie')
for (pkg, issue, desc, debianbug, release, subrelease, db_version, db_fixed_version, db_status, db_urgency, db_remote, db_nodsa, db_nodsa_reason) in self.db.cursor().execute(
"""SELECT sp.name, st.bug_name,
(SELECT cve_desc FROM nvd_data
......
......@@ -59,7 +59,7 @@
"jessie-proposed-updates"
]
},
"release": "oldstable"
"release": "oldoldstable"
},
"stretch": {
"members": {
......@@ -71,7 +71,7 @@
"stretch-proposed-updates"
]
},
"release": "stable"
"release": "oldstable"
},
"buster": {
"members": {
......@@ -83,7 +83,7 @@
"buster-proposed-updates"
]
},
"release": "testing"
"release": "stable"
},
"bullseye": {
"members": {
......@@ -94,7 +94,8 @@
"optional": [
"bullseye-proposed-updates"
]
}
},
"release": "testing"
},
"bookworm": {
"members": {
......
CVE-2017-12424
[stretch] - shadow 1:4.4-4.1+deb9u1
CVE-2015-9261 [busybox: pointer misuse unziping files]
[stretch] - busybox 1:1.22.0-19+deb9u1
CVE-2016-2148
[stretch] - busybox 1:1.22.0-19+deb9u1
CVE-2016-2147
[stretch] - busybox 1:1.22.0-19+deb9u1
CVE-2011-5325
[stretch] - busybox 1:1.22.0-19+deb9u1
CVE-2017-15873
[stretch] - busybox 1:1.22.0-19+deb9u1
CVE-2017-16544
[stretch] - busybox 1:1.22.0-19+deb9u1
CVE-2017-17840
[stretch] - open-iscsi 2.0.874-3~deb9u2
CVE-2017-9527
[stretch] - mruby 1.2.0+20161228+git30d5424a-1+deb9u1
CVE-2018-14779
[stretch] - yubico-piv-tool 1.4.2-2+deb9u1
CVE-2018-14780
[stretch] - yubico-piv-tool 1.4.2-2+deb9u1
CVE-2018-18718
[stretch] - gthumb 3:3.4.4.1-5+deb9u1
CVE-2018-16336
[stretch] - exiv2 0.25-3.1+deb9u2
CVE-2019-6438
[stretch] - slurm-llnl 16.05.9-1+deb9u3
CVE-2019-7659
[stretch] - gsoap 2.8.35-4+deb9u2
CVE-2019-XXXX
[stretch] - open-vm-tools 2:10.1.5-5055683-4+deb9u2
NOTE: For #925959 (no CVE)
CVE-2019-8907
[stretch] - file 1:5.30-1+deb9u3
CVE-2019-8905
[stretch] - file 1:5.30-1+deb9u3
CVE-2019-11627
[stretch] - signing-party 2.5-1+deb9u1
CVE-2018-20544
[stretch] - libcaca 0.99.beta19-2.1~deb9u1
CVE-2018-20545
[stretch] - libcaca 0.99.beta19-2.1~deb9u1
CVE-2018-20546
[stretch] - libcaca 0.99.beta19-2.1~deb9u1
CVE-2018-20547
[stretch] - libcaca 0.99.beta19-2.1~deb9u1
CVE-2018-20548
[stretch] - libcaca 0.99.beta19-2.1~deb9u1
CVE-2018-20549
[stretch] - libcaca 0.99.beta19-2.1~deb9u1
CVE-2018-1320
[stretch] - libthrift-java 0.9.1-2.1~deb9u1
CVE-2019-11675
[stretch] - groonga 6.1.5-1+deb9u1
CVE-2019-2627
[stretch] - mariadb-10.1 10.1.40-0+deb9u1
CVE-2019-2614
[stretch] - mariadb-10.1 10.1.40-0+deb9u1
CVE-2018-19105
[stretch] - librecad 2.1.2-1+deb9u1
CVE-2019-12106
[stretch] - minissdpd 1.2.20130907-4.1+deb9u1
CVE-2017-16042
[stretch] - node-growl 1.7.0-1+deb9u1
CVE-2019-12107
[stretch] - miniupnpd 1.8.20140523-4.1+deb9u2
CVE-2019-12108
[stretch] - miniupnpd 1.8.20140523-4.1+deb9u2
CVE-2019-12109
[stretch] - miniupnpd 1.8.20140523-4.1+deb9u2
CVE-2019-12110
[stretch] - miniupnpd 1.8.20140523-4.1+deb9u2
CVE-2019-11038
[stretch] - libgd2 2.2.4-2+deb9u5
CVE-2018-3774
[stretch] - node-url-parse 1.0.5-2+deb9u1
CVE-2017-11746
[stretch] - tenshi 0.13-2.1~deb9u1
CVE-2019-13031
[stretch] - lemonldap-ng 1.9.7-3+deb9u2
CVE-2018-5995
[stretch] - linux 4.9.184-1
CVE-2019-3882
[stretch] - linux 4.9.184-1
CVE-2018-20836
[stretch] - linux 4.9.184-1
CVE-2019-11487
[stretch] - linux 4.9.184-1
CVE-2019-10142
[stretch] - linux 4.9.184-1
CVE-2015-8553
[stretch] - linux 4.9.184-1
CVE-2018-20510
[stretch] - linux 4.9.184-1
CVE-2018-20509
[stretch] - linux 4.9.184-1
CVE-2019-10639
[stretch] - linux 4.9.184-1
CVE-2019-10153
[stretch] - fence-agents 4.0.25-1+deb9u1
CVE-2017-12424
[stretch] - shadow 1:4.4-4.1+deb9u1
CVE-2015-9261 [busybox: pointer misuse unziping files]
[stretch] - busybox 1:1.22.0-19+deb9u1
CVE-2016-2148
[stretch] - busybox 1:1.22.0-19+deb9u1
CVE-2016-2147
[stretch] - busybox 1:1.22.0-19+deb9u1
CVE-2011-5325
[stretch] - busybox 1:1.22.0-19+deb9u1
CVE-2017-15873
[stretch] - busybox 1:1.22.0-19+deb9u1
CVE-2017-16544
[stretch] - busybox 1:1.22.0-19+deb9u1
CVE-2017-17840
[stretch] - open-iscsi 2.0.874-3~deb9u2
CVE-2017-9527
[stretch] - mruby 1.2.0+20161228+git30d5424a-1+deb9u1
CVE-2018-14779
[stretch] - yubico-piv-tool 1.4.2-2+deb9u1
CVE-2018-14780
[stretch] - yubico-piv-tool 1.4.2-2+deb9u1
CVE-2018-18718
[stretch] - gthumb 3:3.4.4.1-5+deb9u1
CVE-2018-16336
[stretch] - exiv2 0.25-3.1+deb9u2
CVE-2019-6438
[stretch] - slurm-llnl 16.05.9-1+deb9u3
CVE-2019-7659
[stretch] - gsoap 2.8.35-4+deb9u2
CVE-2019-XXXX
[stretch] - open-vm-tools 2:10.1.5-5055683-4+deb9u2
NOTE: For #925959 (no CVE)
CVE-2019-8907
[stretch] - file 1:5.30-1+deb9u3
CVE-2019-8905
[stretch] - file 1:5.30-1+deb9u3
CVE-2019-11627
[stretch] - signing-party 2.5-1+deb9u1
CVE-2018-20544
[stretch] - libcaca 0.99.beta19-2.1~deb9u1
CVE-2018-20545
[stretch] - libcaca 0.99.beta19-2.1~deb9u1
CVE-2018-20546
[stretch] - libcaca 0.99.beta19-2.1~deb9u1
CVE-2018-20547
[stretch] - libcaca 0.99.beta19-2.1~deb9u1
CVE-2018-20548
[stretch] - libcaca 0.99.beta19-2.1~deb9u1
CVE-2018-20549
[stretch] - libcaca 0.99.beta19-2.1~deb9u1
CVE-2018-1320
[stretch] - libthrift-java 0.9.1-2.1~deb9u1
CVE-2019-11675
[stretch] - groonga 6.1.5-1+deb9u1
CVE-2019-2627
[stretch] - mariadb-10.1 10.1.40-0+deb9u1
CVE-2019-2614
[stretch] - mariadb-10.1 10.1.40-0+deb9u1
CVE-2018-19105
[stretch] - librecad 2.1.2-1+deb9u1
CVE-2019-12106
[stretch] - minissdpd 1.2.20130907-4.1+deb9u1
CVE-2017-16042
[stretch] - node-growl 1.7.0-1+deb9u1
CVE-2019-12107
[stretch] - miniupnpd 1.8.20140523-4.1+deb9u2
CVE-2019-12108
[stretch] - miniupnpd 1.8.20140523-4.1+deb9u2
CVE-2019-12109
[stretch] - miniupnpd 1.8.20140523-4.1+deb9u2
CVE-2019-12110
[stretch] - miniupnpd 1.8.20140523-4.1+deb9u2
CVE-2019-11038
[stretch] - libgd2 2.2.4-2+deb9u5
CVE-2018-3774
[stretch] - node-url-parse 1.0.5-2+deb9u1
CVE-2017-11746
[stretch] - tenshi 0.13-2.1~deb9u1
CVE-2019-13031
[stretch] - lemonldap-ng 1.9.7-3+deb9u2
CVE-2018-5995
[stretch] - linux 4.9.184-1
CVE-2019-3882
[stretch] - linux 4.9.184-1
CVE-2018-20836
[stretch] - linux 4.9.184-1
CVE-2019-11487
[stretch] - linux 4.9.184-1
CVE-2019-10142
[stretch] - linux 4.9.184-1
CVE-2015-8553
[stretch] - linux 4.9.184-1
CVE-2018-20510
[stretch] - linux 4.9.184-1
CVE-2018-20509
[stretch] - linux 4.9.184-1
CVE-2019-10639
[stretch] - linux 4.9.184-1
CVE-2019-10153
[stretch] - fence-agents 4.0.25-1+deb9u1
......@@ -14,6 +14,9 @@ Debian Bug : $BUGNUM
$TEXT
For the oldstable distribution ($OLDSTABLE), this problem has been fixed
in version $$OLDSTABLE_VERSION.
For the stable distribution ($STABLE), this problem has been fixed in
version $$STABLE_VERSION.
......
# This file defines the variables describing all Debian repositories
# that need to be fetched in the "update-packages" process
BACKPORT_RELEASES := $(STABLE)
BACKPORT_RELEASES := $(OLDSTABLE) $(STABLE)
SECURITY_RELEASES := $(OLDOLDSTABLE) $(OLDSTABLE) $(STABLE) $(TESTING)
MAIN_RELEASES := $(SECURITY_RELEASES) sid
......
......@@ -195,7 +195,7 @@ class Release(PseudoEnum): pass
def listReleases():
releases = {}
rels = ("experimental", # For use in [brackets] in the list files.
"potato", "woody", "sarge", "etch", "lenny", "squeeze", "wheezy", "jessie", "stretch", "buster", "sid")
"potato", "woody", "sarge", "etch", "lenny", "squeeze", "wheezy", "jessie", "stretch", "buster", "bullseye", "sid")
for r in range(len(rels)):
releases[rels[r]] = Release(rels[r], r)
Release.releases = releases
......
......@@ -43,6 +43,7 @@ def apply_config():
jessie_archs = [ 'amd64','armel','armhf','i386' ]
stretch_archs = [ 'amd64','arm64','armel','armhf','i386','mips','mips64el','mipsel','ppc64el','s390x' ]
buster_archs = [ 'amd64','arm64','armel','armhf','i386','mips','mips64el','mipsel','ppc64el','s390x' ]
bullseye_archs = [ 'amd64','arm64','armel','armhf','i386','mips','mips64el','mipsel','ppc64el','s390x' ]
sid_archs = [ 'amd64','arm64','armel','armhf','i386','mips','mips64el','mipsel','ppc64el','s390x' ]
add_release(name='squeeze',
......@@ -65,6 +66,10 @@ def apply_config():
architectures=buster_archs,
)
add_release(name='bullseye',
architectures=bullseye_archs,
)
add_release(name='sid',
architectures=sid_archs,
)
......
......@@ -479,7 +479,7 @@ class DB:
COALESCE((SELECT NOT vulnerable
FROM source_packages AS tsecp, source_package_status AS tsecst
WHERE tsecp.name = sp.name
AND tsecp.release = 'buster' AND tsecp.subrelease = 'security'
AND tsecp.release = 'bullseye' AND tsecp.subrelease = 'security'
AND tsecp.archive = sp.archive
AND tsecst.bug_name = st.bug_name
AND tsecst.package = tsecp.rowid), 0) AS testing_security_fixed,
......@@ -488,13 +488,13 @@ class DB:
(EXISTS (SELECT * FROM package_notes_nodsa AS pnd
WHERE pnd.bug_name = st.bug_name
AND pnd.package = sp.name
AND pnd.release = 'buster')) AS no_dsa
AND pnd.release = 'bullseye')) AS no_dsa
FROM source_package_status AS st, source_packages AS sp
WHERE st.vulnerable > 0 AND sp.rowid = st.package
AND sp.release = 'buster' AND sp.subrelease = ''
AND sp.release = 'bullseye' AND sp.subrelease = ''
ORDER BY sp.name, st.urgency, st.bug_name""")
for (name, nickname) in (('stable', 'stretch'), ('oldstable', 'jessie'), ('oldoldstable', 'wheezy'),):
for (name, nickname) in (('stable', 'buster'), ('oldstable', 'stretch'), ('oldoldstable', 'jessie'),):
cursor.execute(
"""CREATE TEMPORARY VIEW %s_status AS
SELECT DISTINCT sp.name AS package, st.bug_name AS bug,
......@@ -582,7 +582,7 @@ class DB:
return -1
self.db.createscalarfunction("subreleasepart_to_number", subreleasepart_to_number, 1)
releases = ['potato', 'woody', 'sarge', 'etch', 'lenny', 'squeeze', 'wheezy', 'jessie', 'stretch', 'buster', 'sid']
releases = ['potato', 'woody', 'sarge', 'etch', 'lenny', 'squeeze', 'wheezy', 'jessie', 'stretch', 'buster', 'bullseye', 'sid']
def release_to_number(u):
try:
return releases.index(u)
......@@ -1140,7 +1140,7 @@ class DB:
"""Calculate vulnerable packages.
To each package note, a release-specific vulnerability status
is attached. Currently, only buster/testing is processed.
is attached. Currently, only bullseye/testing is processed.
Returns a list strings describing inconsistencies.
"""
......@@ -1156,7 +1156,7 @@ class DB:
# The following does not work because stable->security ->
# testing -> unstable propagation is no longer available.
if False:
# Ignore buster/testing because stable issues may be
# Ignore bullseye/testing because stable issues may be
# fast-tracked into testing, bypassing unstable.
for (bug_name, pkg_name, rel, unstable_ver, rel_ver) \
in list(cursor.execute(
......@@ -1164,7 +1164,7 @@ class DB:
a.fixed_version, b.fixed_version
FROM package_notes a, package_notes b
WHERE a.bug_name = b.bug_name AND a.package = b.package
AND a.release = '' AND b.release NOT IN ('', 'buster')
AND a.release = '' AND b.release NOT IN ('', 'bullseye')
AND a.fixed_version IS NOT NULL
AND a.fixed_version_id < b.fixed_version_id""")):
b = bugs.BugFromDB(cursor, bug_name)
......@@ -1280,10 +1280,10 @@ class DB:
"SELECT name FROM bugs WHERE NOT not_for_us"):
self._calcUnstable(c, bug_name)
self._calcTesting(c, bug_name, 'testing', 'buster')
self._calcTesting(c, bug_name, 'stable', 'stretch')
self._calcTesting(c, bug_name, 'oldstable', 'jessie')
self._calcTesting(c, bug_name, 'oldoldstable', 'wheezy')
self._calcTesting(c, bug_name, 'testing', 'bullseye')
self._calcTesting(c, bug_name, 'stable', 'buster')
self._calcTesting(c, bug_name, 'oldstable', 'stretch')
self._calcTesting(c, bug_name, 'oldoldstable', 'jessie')
return result
......@@ -1732,7 +1732,7 @@ class DB:
store_value('release/1/' + release, '\n'.join(result))
for release in ('sid', 'wheezy', 'jessie', 'stretch', 'buster'):
for release in ('sid', 'jessie', 'stretch', 'buster', 'bullseye'):
gen_release(release)
result = result_start
......@@ -1745,7 +1745,7 @@ class DB:
def calculateDebsecan(self):
"""Calculate all debsecan data."""
for release in ('', 'wheezy', 'jessie', 'stretch', 'buster'):
for release in ('', 'jessie', 'stretch', 'buster', 'bullseye'):
self.calculateDebsecan0(release)
self.calculateDebsecan1()
......@@ -1782,7 +1782,7 @@ class DB:
"""SELECT release_name(release, subrelease, archive)
AS release, version FROM source_packages
WHERE name = ?
AND release IN ('wheezy', 'jessie', 'stretch', 'buster', 'sid')
AND release IN ('jessie', 'stretch', 'buster', 'bullseye', 'sid')
GROUP BY release, version
ORDER BY release_to_number(release), subrelease_to_number(subrelease), version COLLATE version""", (pkg,)):
yield release, version
......@@ -1837,7 +1837,7 @@ class DB:
p.version AS version, s.vulnerable AS vulnerable
FROM source_package_status AS s, source_packages AS p
WHERE s.bug_name = ? AND p.rowid = s.package
AND release in ('wheezy', 'jessie', 'stretch', 'buster', 'sid'))
AND release in ('jessie', 'stretch', 'buster', 'bullseye', 'sid'))
GROUP BY package, version, vulnerable
ORDER BY package, releasepart_to_number(release), subreleasepart_to_number(release), version COLLATE version""",
(bug,)):
......
......@@ -16,8 +16,8 @@
},
"buster": {
"major-version": "10",
"support": "none",
"contact": ""
"support": "security",
"contact": "team@security.debian.org"
},
"bullseye": {
"major-version": "11",
......