Hi, giving this a try for the trixie release: If anyone wants to help getting trixie in good shape: Here's a list of open security issues below the RC threshold which would still be useful to fix before the release. Many of these haven't seen recent updates, so if anyone has time, check their status and apply/backport patches as needed and submit them in the BTS or as MRs or NMU if appropriate:
If anyone of these are bogus, don't apply to how we ship them in Debian or cannot be addressed in some manner, you can also leave a note in the bug or bounce a note to t...@security.debian.org so that we update the Security Tracker data accordingly. augeas: https://security-tracker.debian.org/tracker/CVE-2025-2588 containerd: https://security-tracker.debian.org/tracker/CVE-2024-40635 corosync: https://security-tracker.debian.org/tracker/CVE-2025-30472 cvc5: https://security-tracker.debian.org/tracker/CVE-2024-37794 https://security-tracker.debian.org/tracker/CVE-2024-37795 djvulibre: https://security-tracker.debian.org/tracker/CVE-2021-46310 freeipa: https://security-tracker.debian.org/tracker/CVE-2024-11029 giflib: https://security-tracker.debian.org/tracker/CVE-2025-31344 golang-github-antonmedv-expr: https://security-tracker.debian.org/tracker/CVE-2025-29786 golang-github-cli-go-gh-v2: https://security-tracker.debian.org/tracker/CVE-2024-53859 golang-github-dvsekhvalnov-jose2go: https://security-tracker.debian.org/tracker/CVE-2023-50658 golang-github-gin-contrib-cors: https://security-tracker.debian.org/tracker/CVE-2019-25211 golang-github-gomarkdown-markdown: https://security-tracker.debian.org/tracker/CVE-2024-44337 golang-github-hashicorp-go-retryablehttp: https://security-tracker.debian.org/tracker/CVE-2024-6104 golang-github-notaryproject-notation-go: https://security-tracker.debian.org/tracker/CVE-2024-56138 golang-go.crypto: https://security-tracker.debian.org/tracker/CVE-2024-45337 https://security-tracker.debian.org/tracker/CVE-2025-22869 golang-golang-x-net: https://security-tracker.debian.org/tracker/CVE-2024-45338 https://security-tracker.debian.org/tracker/CVE-2025-22872 grpc: https://security-tracker.debian.org/tracker/CVE-2023-32732 https://security-tracker.debian.org/tracker/CVE-2023-33953 https://security-tracker.debian.org/tracker/CVE-2023-44487 https://security-tracker.debian.org/tracker/CVE-2023-4785 https://security-tracker.debian.org/tracker/CVE-2024-11407 https://security-tracker.debian.org/tracker/CVE-2024-7246 hugo: https://security-tracker.debian.org/tracker/CVE-2024-55601 invesalius: https://security-tracker.debian.org/tracker/CVE-2024-42845 jboss-xnio: https://security-tracker.debian.org/tracker/CVE-2023-5685 jenkins-json: https://security-tracker.debian.org/tracker/CVE-2023-5072 jline3: https://security-tracker.debian.org/tracker/CVE-2023-50572 libcoap3: https://security-tracker.debian.org/tracker/CVE-2023-51847 https://security-tracker.debian.org/tracker/CVE-2024-0962 https://security-tracker.debian.org/tracker/CVE-2024-31031 https://security-tracker.debian.org/tracker/CVE-2024-46304 libcrypto++: https://security-tracker.debian.org/tracker/CVE-2023-50980 libowasp-antisamy-java: https://security-tracker.debian.org/tracker/CVE-2024-23635 libwoodstox-java: https://security-tracker.debian.org/tracker/CVE-2022-40152 libxml-security-java: https://security-tracker.debian.org/tracker/CVE-2023-44483 logback: https://security-tracker.debian.org/tracker/CVE-2024-12798 https://security-tracker.debian.org/tracker/CVE-2024-12801 mina2: https://security-tracker.debian.org/tracker/CVE-2024-52046 node-dompurify: https://security-tracker.debian.org/tracker/CVE-2025-26791 node-katex: https://security-tracker.debian.org/tracker/CVE-2025-23207 node-prismjs: https://security-tracker.debian.org/tracker/CVE-2024-53382 openimageio: https://security-tracker.debian.org/tracker/CVE-2024-55192 https://security-tracker.debian.org/tracker/CVE-2024-55193 https://security-tracker.debian.org/tracker/CVE-2024-55194 php-laravel-framework: https://security-tracker.debian.org/tracker/CVE-2024-13918 https://security-tracker.debian.org/tracker/CVE-2024-13919 https://security-tracker.debian.org/tracker/CVE-2025-27515 protobuf: https://security-tracker.debian.org/tracker/CVE-2024-7254 qtbase-opensource-src-gles: https://security-tracker.debian.org/tracker/CVE-2024-39936 quickjs: https://security-tracker.debian.org/tracker/CVE-2024-13903 rclone: https://security-tracker.debian.org/tracker/CVE-2024-52522 ros-dynamic-reconfigure: https://security-tracker.debian.org/tracker/CVE-2024-39780 ruby-fugit: https://security-tracker.debian.org/tracker/CVE-2024-43380 rust-gix-features: https://security-tracker.debian.org/tracker/CVE-2025-31130 sqlite3: https://security-tracker.debian.org/tracker/CVE-2025-29088 squirrel3: https://security-tracker.debian.org/tracker/CVE-2021-41556 wabt: https://security-tracker.debian.org/tracker/CVE-2023-46332 xorg-server: https://security-tracker.debian.org/tracker/CVE-2022-49737 And if anyone uses GDM on Trixie, it would be useful to test if https://security-tracker.debian.org/tracker/CVE-2016-1000002 is still applicable and update #849432 as neeed. Cheers, Moritz