There are 7 open security issues in trixie.
There are 7 open security issues in sid.
commit eb6d684042c00a1b935bd8157e236427db5f70f4 Author: Markus Koschany <apo@debian.org> Date: Thu Dec 26 20:59:21 2019 +0100 Set distribution to UNRELEASED commit 7c278ce79b3ce052ec6a018074f900f3cf5d4b7f Author: Markus Koschany <apo@debian.org> Date: Thu Dec 26 20:47:04 2019 +0100 Add a maven rule for hamcrest commit fb31d5ec6fb5c717e170d75eec43736920a44b2f Author: Markus Koschany <apo@debian.org> Date: Thu Dec 26 20:28:56 2019 +0100 Add libhamcrest-java to B-D. commit 14cb513a8ab48fe71dad632e4b3b8d3b695de33a Author: Markus Koschany <apo@debian.org> Date: Thu Dec 26 20:26:29 2019 +0100 Ignore org.apache.maven.plugins:maven-failsafe-plugin commit 9431722e1efb566803c03b0e0b0c6a0244e78f24 Author: Markus Koschany <apo@debian.org> Date: Thu Dec 26 20:21:44 2019 +0100 Ignore some unsupported modules commit 17291ba36402a64c6763cdf4e42a93c766a4bd53 Author: Markus Koschany <apo@debian.org> Date: Thu Dec 26 20:06:31 2019 +0100 Refresh patches for new release commit 1d3306c6aa9d63b47add579df9e0d533427001bc Author: Markus Koschany <apo@debian.org> Date: Thu Dec 26 20:03:30 2019 +0100 Update changelog commit 41d3d9c459c19180cc9308bcb5ec6ca815d5431d Author: Markus Koschany <apo@debian.org> Date: Thu Dec 26 20:00:52 2019 +0100 Declare compliance with Debian Policy 4.4.1. commit 6513830d7dedaccfa5af4d41f54400b9d9065ac8 Author: Markus Koschany <apo@debian.org> Date: Thu Dec 26 20:00:32 2019 +0100 Switch to debhelper-compat = 12. commit 918b601b534d483196e795901162fe353866f804 Merge: 8cf8783 74e76a3 Author: Markus Koschany <apo@debian.org> Date: Thu Dec 26 20:00:17 2019 +0100 Update upstream source from tag 'upstream/1.4.2' Update to upstream version '1.4.2' with Debian dir 329b1ef1be4dfb295305f4b5421a9f09bc6edfa0 commit 74e76a3a4aabd34d62b6aaff44297c853227b8da Author: Markus Koschany <apo@debian.org> Date: Thu Dec 26 20:00:12 2019 +0100 New upstream version 1.4.2
There are 7 open security issues in bookworm.
You can find information about how to handle these issues in the security team's documentation.
Among the 9 debian patches available in version 1.3.2-5 of the package, we noticed the following issues: