Hi,

On 27/05/2025 14:06, Sean Whitton wrote:
Hello release team,

How do you detect packages that need rebuilding in stable releases
because they have outdated Built-Using?  Sylvain Beucler of the LTS team
noted that we may need to do this for bullseye because we have updated
glibc.

If there are already scripts to do this, it would be great if you could
direct me to them.  Thanks.

Probably something like:

# apt-cache dumpavail | \
    grep-dctrl \
        -F Built-Using 'glibc' -a \
        '(' --not -F Architecture all ')' \
        -s Source,Package,Version
Package: aide
Version: 0.17.3-4+deb11u2

Source: bash
Package: bash-static
Version: 5.1-2+deb11u1

Source: cdebootstrap (0.7.8)
Package: cdebootstrap-static
Version: 0.7.8+b3

Source: chkrootkit (0.54-1)
Package: chkrootkit
Version: 0.54-1+b2

Source: dar (2.6.13-2)
Package: dar-static
Version: 2.6.13-2+b3

Package: debian-installer
Version: 20210731+deb11u12

Source: sash (3.8-5)
Package: sash
Version: 3.8-5+b13

Source: tripwire (2.4.3.7-3)
Package: tripwire
Version: 2.4.3.7-3+b3

Source: zsh
Package: zsh-static
Version: 5.8-6+deb11u1

Source: zutils (1.10-1)
Package: zutils
Version: 1.10-1+b2

Source: busybox
Package: busybox-static
Version: 1:1.30.1-6+deb11u1

Package: docker.io
Version: 20.10.5+dfsg1-1+deb11u4

Source: qemu
Package: qemu-user-static
Version: 1:5.2+dfsg-11+deb11u4


then manually checking the last upload date, and evaluating the CVE impact.


Some more packages are selected without "--not -F Architecture all", including debian-installer-netboot-images and cross-toolchain-base-ports, but we don't have to rebuild everything, only those we think may be impacted by fixed CVEs.


Note: Built-Using is less exhaustive in older (ELTS) releases.
See also https://lts-team.pages.debian.net/wiki/TestSuites/golang.html#identify-reverse-build-dependencies


This is tracked through
https://salsa.debian.org/lts-team/lts-updates-tasks/-/issues/227

Cheers!
Sylvain Beucler
Debian LTS Team

Reply via email to