Re: [SECURITY] [DLA 3014-1] elog security update

2022-05-20 Thread Ola Lundqvist
Hi Utkarsh Did you type the CVE-number wrong? The CVE is CVE-2020-8859, right? Cheers // Ola On Wed, 18 May 2022 at 14:12, Utkarsh Gupta wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > - --- > Debian LTS Advis

Re: How to interpret packages-to-support

2022-05-20 Thread Roberto C . Sánchez
On Fri, May 20, 2022 at 11:09:47PM +0200, Ola Lundqvist wrote: > Hi LTS team > > I looked at nvidia-graphics-drivers-legacy-340xx who have two CVEs. I > can see that this package is not in "packages-to-support" for LTS. But > I can see that nvidia-graphics-drivers is. > I'm not sure how to interpr

How to interpret packages-to-support

2022-05-20 Thread Ola Lundqvist
Hi LTS team I looked at nvidia-graphics-drivers-legacy-340xx who have two CVEs. I can see that this package is not in "packages-to-support" for LTS. But I can see that nvidia-graphics-drivers is. I'm not sure how to interpret this. Do the entry in packages-to-support mean that all nvidia-graphics-

What is going on with debian-security-support in stretch?

2022-05-20 Thread Roberto C . Sánchez
Hi all, I've not looked at the debian-security-support project in some time and just now looking it for gpac EOL I've noticed that it seems very outdated on stretch. Currently the version of debian-security-support in stretch is 1:9+2021.01.23. The last entry in security-support-ended.deb9 when

gpac end-of-life in stretch (and recommendation for buster/bullseye)

2022-05-20 Thread Roberto C . Sánchez
LTS and Security Teams, Based on previous discussion [0], I have marked gpac as end-of-life for stretch in commit 0a6147d6b8 of debian-security-support [1]. It seems advisable that the Security Team do the same for gpac in buster and bullseye. Regards, -Roberto [0] https://lists.debian.org/deb