[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Backports policy for security updates (was: Re: python-django_1.8.18-1~bpo8+1_amd64.changes REJECTED)



> On Tue, 23 May 2017, Scott Kitterman wrote:
> > On May 23, 2017 5:28:04 PM EDT, Alexander Wirt <formorer@formorer.de> 
wrote:
...
> > There are security fixes in this upload.  What's the way to get those
> > fixed?  Backporting 1.10 isn't an option because it is incompatible with
> > many other packages.
> > 
> > Would cherry-picked security fixes be okay?
> 
> The policy is pretty clear. Backporting 1.10 and backport the other packages
> too.
> 
> It is maybe a problem and maybe we should get the policy changed - I
> personally don't think too. I don't wan't software that isn't in testing in
> backports - but doing it behinds our back is not an option.
> 
> Alex

OK.  Let's try and step away from this one instance for a moment and discuss 
what makes sense for policy for backports.

It does happen that changes get into testing that make it impractical to do 
further backports (in the case at hand it potentially impacts 125 packages, I 
would consider that impractical, but I suppose not everyone would agree).  
Regardless of python-django, I think there are going to be cases where 
updating from testing will no longer be feasible.

If a severe bug is present in the backported package and updates via testing 
aren't feasible, what's the right answer?  I can think of three options, none 
of them ideal:

1.  Remove the backport.  Per the policy, backports are supposed to be 
supported and supportable for the life a release.  If that's no longer true, 
it should be removed.  While this gets the buggy package out of the archive 
and prevents new installs, it does nothing for users that have previously 
installed the package.

2.  Leave the bug unaddressed.  Depending on the severity of the issue, this 
may be the best answer.

3.  Allow fixes to be added to existing backports packages to address severe 
(including security) bugs.  This breaks the backport from testing paradigm and 
is sure to get abused by some, but in cases where it is no longer feasible to 
update the backport, it may be the only answer.

As you can probably guess from the way I wrote them up, I favor choice 3 and 
would like to see about getting the policy updated to explicitly allow it.  As 
a concept, does that seem reasonable to you?

Scott K


Reply to: