On Thu, Feb 05, 2015 at 09:38:11AM +0100, Paul van der Vlis wrote:
Op 05-02-15 om 00:54 schreef Holger Levsen:
and then finally, sometime later in 2014, security support for oldstable was
finally introduced for the first time.
There was always a year security support for oldstable (sometimes with
some remarks in te release notes for Mozilla products).
That's not actually true. Prior to potato, security supported ended
pretty much immediately upon the next release. With potato the security
team pointed out vulnerabilities that affected slink for a few months,
but I don't recall that any packages were built. Potato was the first
release I'm sure got packages after its successor was released, and I
remember the security team trying to figure out how long to keep that
up. https://lists.debian.org/debian-devel-announce/2002/11/msg00001.html
Note the reference to having done so for a whole three months. :) I
don't think it went a full year, and I don't think it was clearly
communicated when the team finally threw in the towel. Woody was the
first release, I think, that got a full year of security updates. So
that's almost 10 years, but only 5 releases. And "full year" always
was best effort, and there were some packages that just didn't make it.
Communication of that has varied, sometimes it was clear and sometimes
not.
What changed in 2014 was an attempt to support for more than one year.
The process of actually building security updates has gotten a lot
easier, which made support more practical; I think the current security
team doesn't spend much time finding machines to build things, the way
things were done 15 years ago--but it will always be a lot of work
backporting pactches to code that upstream stopped supporting years
earlier. At some point, security updates for old releases is more a fig
leaf than reality: nobody puts as much effort into finding problems with
obsolete code as current code, so only the really obvious problems will
get fixed. And another reality is that even for the obvious problems if
the fix is too hard it'll get kicked down the road and not get done
before the end of LTS. (Not a criticism of the debian LTS team, more an
observation of LTS for both commercial and free projects over the
decades.)
Mike Stone
--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150205133704.gj31...@mathom.us