it is up to you to check whether 3 parches ( making r1 into r4 ) already cover the CVE-s, then open actionable issue reports. Then it is up to maintainer to either pull upstream patches or bump version.
Or you make a well formatted pull reques and force their hand to bump or patch with debian patch
EDIT: we are not sending you away, I am pretty sure among 20 there is at least one missing patch yielding a security issue in a distributed package.....