On Sat, Jan 18, 2025 at 12:14:16PM +1100, George at Clug wrote:
> 
> I rarely use backports, but when I do, I like the "adjusted and
> recompiled for usage on Debian stable" part, much better that grabbing
> packages from other distributions and just installing them, hoping
> there will not be issues.  Though I had not realised that at times, a
> package would be moved/copied from backports into security, I would
> not have expected that action, but it does make sense when you
> explained it.
> 
To be entirely clear, "at times, a package would be moved/copied from
backports into security" is 100% NOT what happens.

Backporting (at least in the Debian context) has two distinct meanings:

- a specific patch or set of patches, which are prepared for a given
  version of a package, are adapted to an older version of that package
- a newer version of some package is rebuilt for an older version of
  Debian (using the older tools and dependencies of that older Debian
  version)

Both of these may happen within the context of a security update, the
second also happens at times outside of a security context.

For the "specific set of patches" case, many open source projects only
maintain a single active development branch of their project. When a
security vulnerability is announced, they fix it in that active release
branch and then move on with life.

When that happens, distro maintainers that are responsible for the
security of older versions of these projects are left to grab the
patches from upstream (usually in the form of one or more git commit
diffs) and then adapt those patches to the older version. This activity
is "backporting of one or more specific patches". This is what was done
recently in the case of rsync.

There is almost never a need to perform this sort of backporting outside
of a security context, though it has happened on occasion.

As far as the two types of full package backports, there is a security
reason to this and a non-security reason.

In the case of security fixes, certain projects make dedicated releases
that restrict the fixes on a given branch to security and high severity
bugs. Projects with a good reputation for this and with policies that
align well with Debian's stable release criteria include Mozilla,
Chromium, MariaDB, PostgreSQL and some others. In general, when they fix
a vulnerability, they fix it in all actively maintained branches. When
that happens and those branches include a new release in the same series
as what is in Debian stable (which is often the case), then the security
team is able to incorporate that new version of the package, build it
for Debian stable and release that as a security update (with something
like a +deb12uX version number).

The other type of full package backport is not for security reasons but
for reasons of wanting a newer version of a package (along with newer
features) in an older Debian release. These packages are provided via
the backports archive, they are not given any security support, and
importantly they do not conform to Debian's stable release criteria.
This means that these packages may have open security vulnerabilities,
and they may have features and behaviors which differ substantially from
what was released in Debian stable. In other words, they may break your
existing whatever (programs you are compiling in the case of a library,
scripts you've written in the case of an interperter, etc).

Regards,

-Roberto
-- 
Roberto C. Sánchez

Reply via email to