On Mon, 11 Oct 2010 14:14:41 +0100, Ian Jackson wrote:
> Florian Weimer writes ("[SECURITY] [DSA-2115-2] New moodle packages fix 
> several vulnerabilities"):
> > DSA-2115-1 introduced a regression because it lacked a dependency on
> > the wwwconfig-common package, leading to installations problems.  This
> > update addresses this issue.  For reference, the text of the original
> > advisory is provided below.
> 
> This is the second recent regression in a security update.  I'm sure
> you'll all agree that this is bad.  It's a shame, because Debian
> security updates have historically had a very good reputation.
> 
> Is there anything that I could do to help with improving things to
> avoid this happening again ?  
> 
> A traditional approach might be to hold a postmortem to try to find
> the chain of events, identify root causes, and make recommendations
> (whether to the Security Team or to others in the project).  Has
> anything like that been done in this case ?

The problem here appears to be the jump to the new upstream version
(1.8.2 to 1.8.13), which has a different dependency set.  New
upstreams are usually disallowed in security uploads.  The question
is why was that OK in this case, rather than the standard backporting
approach?

Best wishes,
Mike


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20101011104029.1ac6c88a.michael.s.gilb...@gmail.com

Reply via email to