There are 5 open security issues in sid.
There are 9 open security issues in forky.
commit cab91c134c67909b201d5cac0887800ef8ca5bf1
Author: Matthias Klose <doko@ubuntu.com>
Date: Tue Apr 7 05:33:35 2026 +0200
* Explicitly build-depend on uuid-dev. LP: #2147343.
commit 97c55a4ee2df3c35d39d32b577710ad16e7dce6d
Author: Matthias Klose <doko@ubuntu.com>
Date: Wed Apr 1 12:38:57 2026 +0200
* Fix the base_interpreter path in the build-details_*.json files.
* Don't ship the build-details_*.json file for the debug interpreter,
because it is installed under the same name as the one for the normal
build. Still has different contents. PEP 739 deficiency ...
commit 77c5bd7b4fea1ccdfcc75ff9da748065caa7ffda
Author: Matthias Klose <doko@ubuntu.com>
Date: Wed Apr 1 10:32:17 2026 +0200
* Also post-process the _sysconfig_vars_*.json files, like done for the
_sysconfigdata_*.py files.
commit 2f7f34f0b5640d598059093ed444fb51b71ff5e4
Author: Matthias Klose <doko@ubuntu.com>
Date: Wed Apr 1 09:11:52 2026 +0200
.gitignore: add one more toplevel dir
Among the 35 debian patches available in version 3.14.3-5 of the package, we noticed the following issues: