[Git][security-tracker-team/security-tracker][master] 16 commits: gen-{DSA,DLA}: Update mappings release and codenames
Salvatore Bonaccorso
carnil at debian.org
Sat Jul 6 10:49:09 BST 2019
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
145c55f1 by Salvatore Bonaccorso at 2019-07-06T07:23:56Z
gen-{DSA,DLA}: Update mappings release and codenames
- - - - -
19045022 by Salvatore Bonaccorso at 2019-07-06T07:23:56Z
DSA.template: Add support for oldstable version information in DSA
- - - - -
62cfdae7 by Salvatore Bonaccorso at 2019-07-06T07:23:56Z
List packages from oldstable and stable for dsa-needed list
Include in listing the oldstable distribution by enable the boolean
value include_oldstable to true and enable the including logic.
- - - - -
9e540da4 by Salvatore Bonaccorso at 2019-07-06T07:23:56Z
support-ended.py: Add release mapping for buster
Add release mapping for Debian 10 (buster) for EOL in all either
security team or LTS team supported suites.
There is no EOL (= LTS supported EOL) set yet for buster.
- - - - -
9b1fd52e by Salvatore Bonaccorso at 2019-07-06T07:23:56Z
tracker_data.py: Update mapping release -> codenames
Shift mappins for oldstable to stretch, stable to buster and new testing
to bullsyeye.
Make LTS suite jessie oldoldstable distribution.
- - - - -
d745bf4f by Salvatore Bonaccorso at 2019-07-06T07:23:56Z
tracker_service: Update release -> codename mappings for stretch release
Update references for backports suites for buster-backports,
stretch-backports and jessie-backports for status overview pages.
For testing migration canidates (which is helpful during freeze periods
to determine which fixes from usntable need to go to testing yet), make
bullseye the new testing distribution.
Updates lists of releases to sid, bullseye, buster, stretch and jessie.
- - - - -
68acbd4d by Salvatore Bonaccorso at 2019-07-06T07:23:56Z
data/config.json: Update mapping release -> codenames
Make stretch the oldstable distribution, buster the new stable
distribution and bullseye the new testing distribution.
- - - - -
aa4c7682 by Salvatore Bonaccorso at 2019-07-06T07:23:56Z
debian_support: Add bullseye to supported releases
- - - - -
bf3ed68e by Salvatore Bonaccorso at 2019-07-06T07:23:56Z
dist_config: Add support for bullseye release and initial list of supported architectures
Add list of currently suported architectures inherited from buster
supported architectures.
- - - - -
91601e1f by Salvatore Bonaccorso at 2019-07-06T07:23:56Z
security_db: Update mappings after buster stable release
- - - - -
ed931cc1 by Salvatore Bonaccorso at 2019-07-06T07:23:56Z
Makefile: Add architectures for bullseye
- - - - -
16ec9f19 by Salvatore Bonaccorso at 2019-07-06T07:23:56Z
Makefile: Update mapping of releases to codenames
- - - - -
55d50915 by Salvatore Bonaccorso at 2019-07-06T07:23:56Z
lib/debian-releases.mk: Fetch backports suites for $(OLDSTABLE)
- - - - -
87ff8002 by Salvatore Bonaccorso at 2019-07-06T07:23:56Z
distributions.json: Mark buster as supported by the Debian security team
- - - - -
1b81a4d9 by Salvatore Bonaccorso at 2019-07-06T07:26:06Z
next-point-update.txt to next-oldstable-point-update.txt
- - - - -
7a17373e by Salvatore Bonaccorso at 2019-07-06T09:48:58Z
Merge branch 'buster-release' into 'master'
Preparations for the security-tracker for the buster release
See merge request security-tracker-team/security-tracker!31
- - - - -
15 changed files:
- Makefile
- bin/add-dsa-needed.sh
- bin/gen-DSA
- bin/support-ended.py
- bin/tracker_data.py
- bin/tracker_service.py
- data/config.json
- data/next-oldstable-point-update.txt
- data/next-point-update.txt
- doc/DSA.template
- lib/debian-releases.mk
- lib/python/debian_support.py
- lib/python/dist_config.py
- lib/python/security_db.py
- static/distributions.json
Changes:
=====================================
Makefile
=====================================
@@ -2,10 +2,10 @@ PYTHON_MODULES = $(wildcard lib/python/*.py)
# The following variables need to be kept up-to-date and can be adjusted
# currently unsupported releases can be commented out
-#OLDOLDSTABLE = wheezy
-OLDSTABLE = jessie
-STABLE = stretch
-TESTING = buster
+OLDOLDSTABLE = jessie
+OLDSTABLE = stretch
+STABLE = buster
+TESTING = bullseye
MIRROR = http://debian.csail.mit.edu/debian
SECURITY_MIRROR = http://security.debian.org/debian-security
@@ -13,6 +13,7 @@ SECURITY_MIRROR = http://security.debian.org/debian-security
jessie_ARCHS = amd64 armel armhf i386
stretch_ARCHS = amd64 arm64 armel armhf i386 mips mips64el mipsel ppc64el s390x
buster_ARCHS = amd64 arm64 armel armhf i386 mips mips64el mipsel ppc64el s390x
+bullseye_ARCHS = amd64 arm64 armel armhf i386 mips mips64el mipsel ppc64el s390x
sid_ARCHS = amd64 arm64 armel armhf i386 mips mips64el mipsel ppc64el s390x
# The rest of the file should not need to be edited
=====================================
bin/add-dsa-needed.sh
=====================================
@@ -20,7 +20,7 @@
set -eu
-include_oldstable=false
+include_oldstable=true
turl="https://security-tracker.debian.org/tracker/status/release"
[ -f data/dsa-needed.txt ] || {
=====================================
bin/gen-DSA
=====================================
@@ -27,10 +27,10 @@ case "$(basename "$0")" in
;;
esac
-OLDOLDSTABLE=wheezy
-OLDSTABLE=jessie
-STABLE=stretch
-TESTING=buster
+OLDOLDSTABLE=jessie
+OLDSTABLE=stretch
+STABLE=buster
+TESTING=bullseye
NAME_SPACING=24
DATE_SPACING=22
=====================================
bin/support-ended.py
=====================================
@@ -32,6 +32,7 @@ release_mapping = {
'deb8': ('jessie', '2020-06-30'),
# End date not yet fixed
'deb9': ('stretch', None),
+ 'deb10': ('buster', None),
}
=====================================
bin/tracker_data.py
=====================================
@@ -22,10 +22,10 @@ import requests
import six
RELEASES = {
- 'oldoldstable': 'wheezy',
- 'oldstable': 'jessie',
- 'stable': 'stretch',
- 'testing': 'buster',
+ 'oldoldstable': 'jessie',
+ 'oldstable': 'stretch',
+ 'stable': 'buster',
+ 'testing': 'bullseye',
'unstable': 'sid',
'experimental': 'experimental',
# LTS specific aliases
=====================================
bin/tracker_service.py
=====================================
@@ -882,19 +882,19 @@ to improve our documentation and procedures, so feedback is welcome.""")])])
return self.page_status_release_unstable_like(
path, params, url,
title='Vulnerable source packages among backports for stable',
- rel='stretch-backports')
+ rel='buster-backports')
def page_status_release_oldstable_backports(self, path, params, url):
return self.page_status_release_unstable_like(
path, params, url,
title='Vulnerable source packages among backports for oldstable',
- rel='jessie-backports')
+ rel='stretch-backports')
def page_status_release_oldoldstable_backports(self, path, params, url):
return self.page_status_release_unstable_like(
path, params, url,
title='Vulnerable source packages among backports for oldoldstable',
- rel='wheezy-backports')
+ rel='jessie-backports')
def page_status_dtsa_candidates(self, path, params, url):
@@ -909,11 +909,11 @@ to improve our documentation and procedures, so feedback is welcome.""")])])
(SELECT testing.version_id < stable.version_id
FROM source_packages AS testing, source_packages AS stable
WHERE testing.name = testing_status.package
- AND testing.release = 'buster'
+ AND testing.release = 'bullseye'
AND testing.subrelease = ''
AND testing.archive = testing_status.section
AND stable.name = testing_status.package
- AND stable.release = 'stretch'
+ AND stable.release = 'buster'
AND stable.subrelease = 'security'
AND stable.archive = testing_status.section),
(SELECT range_remote FROM nvd_data
@@ -994,7 +994,7 @@ checker to find out why they have not entered testing yet."""),
old_pkg = ''
old_dsc = ''
last_displayed = ''
- releases = ('sid', 'buster', 'stretch', 'jessie', 'wheezy')
+ releases = ('sid', 'bullseye', 'buster', 'stretch', 'jessie')
for (pkg_name, bug_name, release, desc) in self.db.cursor().execute(
"""SELECT DISTINCT sp.name, st.bug_name, sp.release,
bugs.description
@@ -1039,7 +1039,7 @@ checker to find out why they have not entered testing yet."""),
old_dsc = ''
old_name = ''
last_displayed = ''
- releases = ('sid', 'buster', 'stretch', 'jessie', 'wheezy')
+ releases = ('sid', 'bullseye', 'buster', 'stretch', 'jessie')
for (pkg_name, bug_name, release, desc) in self.db.cursor().execute(
"""SELECT DISTINCT sp.name, st.bug_name, sp.release,
bugs.description
@@ -1325,7 +1325,7 @@ Debian bug number.'''),
urgency = defaultdict(lambda: defaultdict(dict))
nodsa = defaultdict(lambda: defaultdict(dict))
nodsa_reason = defaultdict(lambda: defaultdict(dict))
- supported_releases = ('sid', 'buster', 'stretch', 'jessie', 'wheezy')
+ supported_releases = ('sid', 'bullseye', 'buster', 'stretch', 'jessie')
for (pkg, issue, desc, debianbug, release, subrelease, db_version, db_fixed_version, db_status, db_urgency, db_remote, db_nodsa, db_nodsa_reason) in self.db.cursor().execute(
"""SELECT sp.name, st.bug_name,
(SELECT cve_desc FROM nvd_data
=====================================
data/config.json
=====================================
@@ -59,7 +59,7 @@
"jessie-proposed-updates"
]
},
- "release": "oldstable"
+ "release": "oldoldstable"
},
"stretch": {
"members": {
@@ -71,7 +71,7 @@
"stretch-proposed-updates"
]
},
- "release": "stable"
+ "release": "oldstable"
},
"buster": {
"members": {
@@ -83,7 +83,7 @@
"buster-proposed-updates"
]
},
- "release": "testing"
+ "release": "stable"
},
"bullseye": {
"members": {
@@ -94,7 +94,8 @@
"optional": [
"bullseye-proposed-updates"
]
- }
+ },
+ "release": "testing"
},
"bookworm": {
"members": {
=====================================
data/next-oldstable-point-update.txt
=====================================
@@ -0,0 +1,101 @@
+CVE-2017-12424
+ [stretch] - shadow 1:4.4-4.1+deb9u1
+CVE-2015-9261 [busybox: pointer misuse unziping files]
+ [stretch] - busybox 1:1.22.0-19+deb9u1
+CVE-2016-2148
+ [stretch] - busybox 1:1.22.0-19+deb9u1
+CVE-2016-2147
+ [stretch] - busybox 1:1.22.0-19+deb9u1
+CVE-2011-5325
+ [stretch] - busybox 1:1.22.0-19+deb9u1
+CVE-2017-15873
+ [stretch] - busybox 1:1.22.0-19+deb9u1
+CVE-2017-16544
+ [stretch] - busybox 1:1.22.0-19+deb9u1
+CVE-2017-17840
+ [stretch] - open-iscsi 2.0.874-3~deb9u2
+CVE-2017-9527
+ [stretch] - mruby 1.2.0+20161228+git30d5424a-1+deb9u1
+CVE-2018-14779
+ [stretch] - yubico-piv-tool 1.4.2-2+deb9u1
+CVE-2018-14780
+ [stretch] - yubico-piv-tool 1.4.2-2+deb9u1
+CVE-2018-18718
+ [stretch] - gthumb 3:3.4.4.1-5+deb9u1
+CVE-2018-16336
+ [stretch] - exiv2 0.25-3.1+deb9u2
+CVE-2019-6438
+ [stretch] - slurm-llnl 16.05.9-1+deb9u3
+CVE-2019-7659
+ [stretch] - gsoap 2.8.35-4+deb9u2
+CVE-2019-XXXX
+ [stretch] - open-vm-tools 2:10.1.5-5055683-4+deb9u2
+ NOTE: For #925959 (no CVE)
+CVE-2019-8907
+ [stretch] - file 1:5.30-1+deb9u3
+CVE-2019-8905
+ [stretch] - file 1:5.30-1+deb9u3
+CVE-2019-11627
+ [stretch] - signing-party 2.5-1+deb9u1
+CVE-2018-20544
+ [stretch] - libcaca 0.99.beta19-2.1~deb9u1
+CVE-2018-20545
+ [stretch] - libcaca 0.99.beta19-2.1~deb9u1
+CVE-2018-20546
+ [stretch] - libcaca 0.99.beta19-2.1~deb9u1
+CVE-2018-20547
+ [stretch] - libcaca 0.99.beta19-2.1~deb9u1
+CVE-2018-20548
+ [stretch] - libcaca 0.99.beta19-2.1~deb9u1
+CVE-2018-20549
+ [stretch] - libcaca 0.99.beta19-2.1~deb9u1
+CVE-2018-1320
+ [stretch] - libthrift-java 0.9.1-2.1~deb9u1
+CVE-2019-11675
+ [stretch] - groonga 6.1.5-1+deb9u1
+CVE-2019-2627
+ [stretch] - mariadb-10.1 10.1.40-0+deb9u1
+CVE-2019-2614
+ [stretch] - mariadb-10.1 10.1.40-0+deb9u1
+CVE-2018-19105
+ [stretch] - librecad 2.1.2-1+deb9u1
+CVE-2019-12106
+ [stretch] - minissdpd 1.2.20130907-4.1+deb9u1
+CVE-2017-16042
+ [stretch] - node-growl 1.7.0-1+deb9u1
+CVE-2019-12107
+ [stretch] - miniupnpd 1.8.20140523-4.1+deb9u2
+CVE-2019-12108
+ [stretch] - miniupnpd 1.8.20140523-4.1+deb9u2
+CVE-2019-12109
+ [stretch] - miniupnpd 1.8.20140523-4.1+deb9u2
+CVE-2019-12110
+ [stretch] - miniupnpd 1.8.20140523-4.1+deb9u2
+CVE-2019-11038
+ [stretch] - libgd2 2.2.4-2+deb9u5
+CVE-2018-3774
+ [stretch] - node-url-parse 1.0.5-2+deb9u1
+CVE-2017-11746
+ [stretch] - tenshi 0.13-2.1~deb9u1
+CVE-2019-13031
+ [stretch] - lemonldap-ng 1.9.7-3+deb9u2
+CVE-2018-5995
+ [stretch] - linux 4.9.184-1
+CVE-2019-3882
+ [stretch] - linux 4.9.184-1
+CVE-2018-20836
+ [stretch] - linux 4.9.184-1
+CVE-2019-11487
+ [stretch] - linux 4.9.184-1
+CVE-2019-10142
+ [stretch] - linux 4.9.184-1
+CVE-2015-8553
+ [stretch] - linux 4.9.184-1
+CVE-2018-20510
+ [stretch] - linux 4.9.184-1
+CVE-2018-20509
+ [stretch] - linux 4.9.184-1
+CVE-2019-10639
+ [stretch] - linux 4.9.184-1
+CVE-2019-10153
+ [stretch] - fence-agents 4.0.25-1+deb9u1
=====================================
data/next-point-update.txt
=====================================
@@ -1,101 +0,0 @@
-CVE-2017-12424
- [stretch] - shadow 1:4.4-4.1+deb9u1
-CVE-2015-9261 [busybox: pointer misuse unziping files]
- [stretch] - busybox 1:1.22.0-19+deb9u1
-CVE-2016-2148
- [stretch] - busybox 1:1.22.0-19+deb9u1
-CVE-2016-2147
- [stretch] - busybox 1:1.22.0-19+deb9u1
-CVE-2011-5325
- [stretch] - busybox 1:1.22.0-19+deb9u1
-CVE-2017-15873
- [stretch] - busybox 1:1.22.0-19+deb9u1
-CVE-2017-16544
- [stretch] - busybox 1:1.22.0-19+deb9u1
-CVE-2017-17840
- [stretch] - open-iscsi 2.0.874-3~deb9u2
-CVE-2017-9527
- [stretch] - mruby 1.2.0+20161228+git30d5424a-1+deb9u1
-CVE-2018-14779
- [stretch] - yubico-piv-tool 1.4.2-2+deb9u1
-CVE-2018-14780
- [stretch] - yubico-piv-tool 1.4.2-2+deb9u1
-CVE-2018-18718
- [stretch] - gthumb 3:3.4.4.1-5+deb9u1
-CVE-2018-16336
- [stretch] - exiv2 0.25-3.1+deb9u2
-CVE-2019-6438
- [stretch] - slurm-llnl 16.05.9-1+deb9u3
-CVE-2019-7659
- [stretch] - gsoap 2.8.35-4+deb9u2
-CVE-2019-XXXX
- [stretch] - open-vm-tools 2:10.1.5-5055683-4+deb9u2
- NOTE: For #925959 (no CVE)
-CVE-2019-8907
- [stretch] - file 1:5.30-1+deb9u3
-CVE-2019-8905
- [stretch] - file 1:5.30-1+deb9u3
-CVE-2019-11627
- [stretch] - signing-party 2.5-1+deb9u1
-CVE-2018-20544
- [stretch] - libcaca 0.99.beta19-2.1~deb9u1
-CVE-2018-20545
- [stretch] - libcaca 0.99.beta19-2.1~deb9u1
-CVE-2018-20546
- [stretch] - libcaca 0.99.beta19-2.1~deb9u1
-CVE-2018-20547
- [stretch] - libcaca 0.99.beta19-2.1~deb9u1
-CVE-2018-20548
- [stretch] - libcaca 0.99.beta19-2.1~deb9u1
-CVE-2018-20549
- [stretch] - libcaca 0.99.beta19-2.1~deb9u1
-CVE-2018-1320
- [stretch] - libthrift-java 0.9.1-2.1~deb9u1
-CVE-2019-11675
- [stretch] - groonga 6.1.5-1+deb9u1
-CVE-2019-2627
- [stretch] - mariadb-10.1 10.1.40-0+deb9u1
-CVE-2019-2614
- [stretch] - mariadb-10.1 10.1.40-0+deb9u1
-CVE-2018-19105
- [stretch] - librecad 2.1.2-1+deb9u1
-CVE-2019-12106
- [stretch] - minissdpd 1.2.20130907-4.1+deb9u1
-CVE-2017-16042
- [stretch] - node-growl 1.7.0-1+deb9u1
-CVE-2019-12107
- [stretch] - miniupnpd 1.8.20140523-4.1+deb9u2
-CVE-2019-12108
- [stretch] - miniupnpd 1.8.20140523-4.1+deb9u2
-CVE-2019-12109
- [stretch] - miniupnpd 1.8.20140523-4.1+deb9u2
-CVE-2019-12110
- [stretch] - miniupnpd 1.8.20140523-4.1+deb9u2
-CVE-2019-11038
- [stretch] - libgd2 2.2.4-2+deb9u5
-CVE-2018-3774
- [stretch] - node-url-parse 1.0.5-2+deb9u1
-CVE-2017-11746
- [stretch] - tenshi 0.13-2.1~deb9u1
-CVE-2019-13031
- [stretch] - lemonldap-ng 1.9.7-3+deb9u2
-CVE-2018-5995
- [stretch] - linux 4.9.184-1
-CVE-2019-3882
- [stretch] - linux 4.9.184-1
-CVE-2018-20836
- [stretch] - linux 4.9.184-1
-CVE-2019-11487
- [stretch] - linux 4.9.184-1
-CVE-2019-10142
- [stretch] - linux 4.9.184-1
-CVE-2015-8553
- [stretch] - linux 4.9.184-1
-CVE-2018-20510
- [stretch] - linux 4.9.184-1
-CVE-2018-20509
- [stretch] - linux 4.9.184-1
-CVE-2019-10639
- [stretch] - linux 4.9.184-1
-CVE-2019-10153
- [stretch] - fence-agents 4.0.25-1+deb9u1
=====================================
doc/DSA.template
=====================================
@@ -14,6 +14,9 @@ Debian Bug : $BUGNUM
$TEXT
+For the oldstable distribution ($OLDSTABLE), this problem has been fixed
+in version $$OLDSTABLE_VERSION.
+
For the stable distribution ($STABLE), this problem has been fixed in
version $$STABLE_VERSION.
=====================================
lib/debian-releases.mk
=====================================
@@ -1,7 +1,7 @@
# This file defines the variables describing all Debian repositories
# that need to be fetched in the "update-packages" process
-BACKPORT_RELEASES := $(STABLE)
+BACKPORT_RELEASES := $(OLDSTABLE) $(STABLE)
SECURITY_RELEASES := $(OLDOLDSTABLE) $(OLDSTABLE) $(STABLE) $(TESTING)
MAIN_RELEASES := $(SECURITY_RELEASES) sid
=====================================
lib/python/debian_support.py
=====================================
@@ -195,7 +195,7 @@ class Release(PseudoEnum): pass
def listReleases():
releases = {}
rels = ("experimental", # For use in [brackets] in the list files.
- "potato", "woody", "sarge", "etch", "lenny", "squeeze", "wheezy", "jessie", "stretch", "buster", "sid")
+ "potato", "woody", "sarge", "etch", "lenny", "squeeze", "wheezy", "jessie", "stretch", "buster", "bullseye", "sid")
for r in range(len(rels)):
releases[rels[r]] = Release(rels[r], r)
Release.releases = releases
=====================================
lib/python/dist_config.py
=====================================
@@ -43,6 +43,7 @@ def apply_config():
jessie_archs = [ 'amd64','armel','armhf','i386' ]
stretch_archs = [ 'amd64','arm64','armel','armhf','i386','mips','mips64el','mipsel','ppc64el','s390x' ]
buster_archs = [ 'amd64','arm64','armel','armhf','i386','mips','mips64el','mipsel','ppc64el','s390x' ]
+ bullseye_archs = [ 'amd64','arm64','armel','armhf','i386','mips','mips64el','mipsel','ppc64el','s390x' ]
sid_archs = [ 'amd64','arm64','armel','armhf','i386','mips','mips64el','mipsel','ppc64el','s390x' ]
add_release(name='squeeze',
@@ -65,6 +66,10 @@ def apply_config():
architectures=buster_archs,
)
+ add_release(name='bullseye',
+ architectures=bullseye_archs,
+ )
+
add_release(name='sid',
architectures=sid_archs,
)
=====================================
lib/python/security_db.py
=====================================
@@ -479,7 +479,7 @@ class DB:
COALESCE((SELECT NOT vulnerable
FROM source_packages AS tsecp, source_package_status AS tsecst
WHERE tsecp.name = sp.name
- AND tsecp.release = 'buster' AND tsecp.subrelease = 'security'
+ AND tsecp.release = 'bullseye' AND tsecp.subrelease = 'security'
AND tsecp.archive = sp.archive
AND tsecst.bug_name = st.bug_name
AND tsecst.package = tsecp.rowid), 0) AS testing_security_fixed,
@@ -488,13 +488,13 @@ class DB:
(EXISTS (SELECT * FROM package_notes_nodsa AS pnd
WHERE pnd.bug_name = st.bug_name
AND pnd.package = sp.name
- AND pnd.release = 'buster')) AS no_dsa
+ AND pnd.release = 'bullseye')) AS no_dsa
FROM source_package_status AS st, source_packages AS sp
WHERE st.vulnerable > 0 AND sp.rowid = st.package
- AND sp.release = 'buster' AND sp.subrelease = ''
+ AND sp.release = 'bullseye' AND sp.subrelease = ''
ORDER BY sp.name, st.urgency, st.bug_name""")
- for (name, nickname) in (('stable', 'stretch'), ('oldstable', 'jessie'), ('oldoldstable', 'wheezy'),):
+ for (name, nickname) in (('stable', 'buster'), ('oldstable', 'stretch'), ('oldoldstable', 'jessie'),):
cursor.execute(
"""CREATE TEMPORARY VIEW %s_status AS
SELECT DISTINCT sp.name AS package, st.bug_name AS bug,
@@ -582,7 +582,7 @@ class DB:
return -1
self.db.createscalarfunction("subreleasepart_to_number", subreleasepart_to_number, 1)
- releases = ['potato', 'woody', 'sarge', 'etch', 'lenny', 'squeeze', 'wheezy', 'jessie', 'stretch', 'buster', 'sid']
+ releases = ['potato', 'woody', 'sarge', 'etch', 'lenny', 'squeeze', 'wheezy', 'jessie', 'stretch', 'buster', 'bullseye', 'sid']
def release_to_number(u):
try:
return releases.index(u)
@@ -1140,7 +1140,7 @@ class DB:
"""Calculate vulnerable packages.
To each package note, a release-specific vulnerability status
- is attached. Currently, only buster/testing is processed.
+ is attached. Currently, only bullseye/testing is processed.
Returns a list strings describing inconsistencies.
"""
@@ -1156,7 +1156,7 @@ class DB:
# The following does not work because stable->security ->
# testing -> unstable propagation is no longer available.
if False:
- # Ignore buster/testing because stable issues may be
+ # Ignore bullseye/testing because stable issues may be
# fast-tracked into testing, bypassing unstable.
for (bug_name, pkg_name, rel, unstable_ver, rel_ver) \
in list(cursor.execute(
@@ -1164,7 +1164,7 @@ class DB:
a.fixed_version, b.fixed_version
FROM package_notes a, package_notes b
WHERE a.bug_name = b.bug_name AND a.package = b.package
- AND a.release = '' AND b.release NOT IN ('', 'buster')
+ AND a.release = '' AND b.release NOT IN ('', 'bullseye')
AND a.fixed_version IS NOT NULL
AND a.fixed_version_id < b.fixed_version_id""")):
b = bugs.BugFromDB(cursor, bug_name)
@@ -1280,10 +1280,10 @@ class DB:
"SELECT name FROM bugs WHERE NOT not_for_us"):
self._calcUnstable(c, bug_name)
- self._calcTesting(c, bug_name, 'testing', 'buster')
- self._calcTesting(c, bug_name, 'stable', 'stretch')
- self._calcTesting(c, bug_name, 'oldstable', 'jessie')
- self._calcTesting(c, bug_name, 'oldoldstable', 'wheezy')
+ self._calcTesting(c, bug_name, 'testing', 'bullseye')
+ self._calcTesting(c, bug_name, 'stable', 'buster')
+ self._calcTesting(c, bug_name, 'oldstable', 'stretch')
+ self._calcTesting(c, bug_name, 'oldoldstable', 'jessie')
return result
@@ -1732,7 +1732,7 @@ class DB:
store_value('release/1/' + release, '\n'.join(result))
- for release in ('sid', 'wheezy', 'jessie', 'stretch', 'buster'):
+ for release in ('sid', 'jessie', 'stretch', 'buster', 'bullseye'):
gen_release(release)
result = result_start
@@ -1745,7 +1745,7 @@ class DB:
def calculateDebsecan(self):
"""Calculate all debsecan data."""
- for release in ('', 'wheezy', 'jessie', 'stretch', 'buster'):
+ for release in ('', 'jessie', 'stretch', 'buster', 'bullseye'):
self.calculateDebsecan0(release)
self.calculateDebsecan1()
@@ -1782,7 +1782,7 @@ class DB:
"""SELECT release_name(release, subrelease, archive)
AS release, version FROM source_packages
WHERE name = ?
- AND release IN ('wheezy', 'jessie', 'stretch', 'buster', 'sid')
+ AND release IN ('jessie', 'stretch', 'buster', 'bullseye', 'sid')
GROUP BY release, version
ORDER BY release_to_number(release), subrelease_to_number(subrelease), version COLLATE version""", (pkg,)):
yield release, version
@@ -1837,7 +1837,7 @@ class DB:
p.version AS version, s.vulnerable AS vulnerable
FROM source_package_status AS s, source_packages AS p
WHERE s.bug_name = ? AND p.rowid = s.package
- AND release in ('wheezy', 'jessie', 'stretch', 'buster', 'sid'))
+ AND release in ('jessie', 'stretch', 'buster', 'bullseye', 'sid'))
GROUP BY package, version, vulnerable
ORDER BY package, releasepart_to_number(release), subreleasepart_to_number(release), version COLLATE version""",
(bug,)):
=====================================
static/distributions.json
=====================================
@@ -16,8 +16,8 @@
},
"buster": {
"major-version": "10",
- "support": "none",
- "contact": ""
+ "support": "security",
+ "contact": "team at security.debian.org"
},
"bullseye": {
"major-version": "11",
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/compare/688e8b7d5433ecac53e3da0b243999e6b1dc0757...7a17373ecc2b473ba99ae0e5fe2565e76e771f32
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/compare/688e8b7d5433ecac53e3da0b243999e6b1dc0757...7a17373ecc2b473ba99ae0e5fe2565e76e771f32
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190706/754455f8/attachment-0001.html>
More information about the debian-security-tracker-commits
mailing list