• Are Debian packages updated within a release?

    From George at Clug@21:1/5 to All on Sat Jan 18 01:00:02 2025
    Hi,


    Are Debian packages updated within a release?


    After running: "# apt update"

    # apt list -a linux-image-amd64
    Listing... Done
    linux-image-amd64/stable-backports 6.11.10-1~bpo12+1 amd64 linux-image-amd64/stable-updates 6.1.124-1 amd64 [upgradable from:
    6.1.106-3]
    linux-image-amd64/stable 6.1.123-1 amd64
    linux-image-amd64/stable-security 6.1.119-1 amd64
    linux-image-amd64/now 6.1.106-3 amd64 [installed,upgradable to:
    6.1.124-1]

    # apt list -a nvidia-driver
    Listing... Done
    nvidia-driver/stable 535.216.01-1~deb12u1 amd64
    nvidia-driver/stable-backports 535.183.06-1~bpo12+1 amd64 nvidia-driver/stable-updates 525.147.05-7~deb12u1 amd64

    # apt list -a chromium
    Listing... Done
    chromium/stable-security 132.0.6834.83-1~deb12u1 amd64
    chromium/stable 131.0.6778.139-1~deb12u1 amd64

    # apt list -a firefox-esr
    Listing... Done
    firefox-esr/stable-security 128.6.0esr-1~deb12u1 amd64 [upgradable
    from: 115.15.0esr-1~deb12u1]
    firefox-esr/stable 128.5.0esr-1~deb12u1 amd64
    firefox-esr/now 115.15.0esr-1~deb12u1 amd64 [installed,upgradable to: 128.6.0esr-1~deb12u1]

    # apt list -a rsync
    Listing... Done
    rsync/stable-security 3.2.7-1+deb12u2 amd64
    rsync/stable 3.2.7-1 amd64


    George.

    <html>
    <head>
    <style type="text/css">
    body,p,td,div,span{
    font-size:13px; font-family:Arial, Helvetica, sans-serif;
    };
    body p{
    margin:0px;
    }
    </style>
    </head>
    <body><div>Hi,</div><div><br></div><div>Are Debian packages updated within a release?</div><div><br></div><div>After running: "# apt update"<br><br># apt list -a linux-image-amd64<br>Listing... Done<br>linux-image-amd64/stable-backports 6.11.10-1~bpo12+1
    amd64<br>linux-image-amd64/stable-updates 6.1.124-1 amd64 [upgradable from: 6.1.106-3]<br>linux-image-amd64/stable 6.1.123-1 amd64<br>linux-image-amd64/stable-security 6.1.119-1 amd64<br>linux-image-amd64/now 6.1.106-3 amd64 [installed,upgradable to: 6.1.
    124-1]<br><br># apt list -a nvidia-driver<br>Listing... Done<br>nvidia-driver/stable 535.216.01-1~deb12u1 amd64<br>nvidia-driver/stable-backports 535.183.06-1~bpo12+1 amd64<br>nvidia-driver/stable-updates 525.147.05-7~deb12u1 amd64<br><br># apt list -a
    chromium<br>Listing... Done<br>chromium/stable-security 132.0.6834.83-1~deb12u1 amd64<br>chromium/stable 131.0.6778.139-1~deb12u1 amd64<br><br># apt list -a firefox-esr<br>Listing... Done<br>firefox-esr/stable-security 128.6.0esr-1~deb12u1 amd64 [
    upgradable from: 115.15.0esr-1~deb12u1]<br>firefox-esr/stable 128.5.0esr-1~deb12u1 amd64<br>firefox-esr/now 115.15.0esr-1~deb12u1 amd64 [installed,upgradable to: 128.6.0esr-1~deb12u1]<br><br># apt list -a rsync<br>Listing... Done<br>rsync/stable-security
    3.2.7-1+deb12u2 amd64<br>rsync/stable 3.2.7-1 amd64</div><div><br></div><div>George.</div><div><br></div></body></html>

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From John Hasler@21:1/5 to All on Sat Jan 18 01:50:01 2025
    In the case of rsync Debian backported a fix. Therefor it gets the old
    version number with a suffix to indicate that Debian patched it. In the
    case of chromium upstream patched it and released the patched version
    with a new version number.
    --
    John Hasler
    john@sugarbit.com
    Elmwood, WI USA

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From George at Clug@21:1/5 to All on Sat Jan 18 01:40:01 2025
    Hi all,

    I became confused by comments on version numbers from the rsync discussion.

    Rsync CVE-2024-12085
    https://security-tracker.debian.org/tracker/CVE-2024-12085
    bookworm (security) 3.2.7-1+deb12u2 fixed


    I am still not sure but this is how I understand version numbering for rsync:

    While in Debian 12, rsync's version will remain at 3.2.7-1, the security patched version number is 3.2.7-1+deb12u2.

    Hence there is no need for me to be concerned about Debian 12 security.

    What I am confused about is that chromium does change its version, for example "131.0.6778.264-1~deb12u1" to "132.0.6834.83-1~deb12u1".

    Maybe different packages follow different rules? However there may be a better explanation.

    Would I be correct in assuming this is because the version of Chromium (as in its features) are being updated within Debian 12, where as the version of rsync (as in features) are not being updated, just a security fix is being applied? And I can use "
    apt list -a rsync" to confirm that the security fixed version is or is not installed to my computers by checking for "3.2.7-1+deb12u2" as per the security-tracker report.

    Thanks,

    George.



    # apt list -a rsync
    Listing... Done
    rsync/stable-security 3.2.7-1+deb12u2 amd64 [upgradable from: 3.2.7-1] rsync/stable,now 3.2.7-1 amd64 [installed,upgradable to: 3.2.7-1+deb12u2]

    rsync/stable-security 3.2.7-1+deb12u2 i386
    rsync/stable 3.2.7-1 i386

    # apt list -a chromium
    Listing... Done
    chromium/stable-security 132.0.6834.83-1~deb12u1 amd64 [upgradable from: 131.0.6778.264-1~deb12u1]
    chromium/now 131.0.6778.264-1~deb12u1 amd64 [installed,upgradable to: 132.0.6834.83-1~deb12u1]
    chromium/stable 131.0.6778.139-1~deb12u1 amd64

    chromium/stable-security 132.0.6834.83-1~deb12u1 i386
    chromium/stable 131.0.6778.139-1~deb12u1 i386




    On Saturday, 18-01-2025 at 10:57 George at Clug wrote:
    Hi,


    Are Debian packages updated within a release?


    After running: "# apt update"

    # apt list -a linux-image-amd64
    Listing... Done
    linux-image-amd64/stable-backports 6.11.10-1~bpo12+1 amd64 linux-image-amd64/stable-updates 6.1.124-1 amd64 [upgradable from:
    6.1.106-3]
    linux-image-amd64/stable 6.1.123-1 amd64
    linux-image-amd64/stable-security 6.1.119-1 amd64
    linux-image-amd64/now 6.1.106-3 amd64 [installed,upgradable to:
    6.1.124-1]

    # apt list -a nvidia-driver
    Listing... Done
    nvidia-driver/stable 535.216.01-1~deb12u1 amd64 nvidia-driver/stable-backports 535.183.06-1~bpo12+1 amd64 nvidia-driver/stable-updates 525.147.05-7~deb12u1 amd64

    # apt list -a chromium
    Listing... Done
    chromium/stable-security 132.0.6834.83-1~deb12u1 amd64
    chromium/stable 131.0.6778.139-1~deb12u1 amd64

    # apt list -a firefox-esr
    Listing... Done
    firefox-esr/stable-security 128.6.0esr-1~deb12u1 amd64 [upgradable
    from: 115.15.0esr-1~deb12u1]
    firefox-esr/stable 128.5.0esr-1~deb12u1 amd64
    firefox-esr/now 115.15.0esr-1~deb12u1 amd64 [installed,upgradable to: 128.6.0esr-1~deb12u1]

    # apt list -a rsync
    Listing... Done
    rsync/stable-security 3.2.7-1+deb12u2 amd64
    rsync/stable 3.2.7-1 amd64


    George.


    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From pocket@homemail.com@21:1/5 to All on Sat Jan 18 02:40:01 2025
    Sent: Friday, January 17, 2025 at 8:30 PM
    From: "Max Nikulin" <manikulin@gmail.com>
    To: debian-user@lists.debian.org
    Subject: Re: Are Debian packages updated within a release?

    On 18/01/2025 07:34, George at Clug wrote:
    Would I be correct in assuming this is because the version of Chromium
    (as in its features) are being updated within Debian 12

    Major browsers are an exception. Security fixes are frequent and
    massive. The upstream teams do not maintain stable versions with support period comparable to Debian stable. It would be too much burden for
    Debian maintainers to track and backport security fixes.

    That is why the rolling release method is superior to the old model used by others.


    That is why latest Chromium release is available in bookworm. Firefox
    and Thunderbird packages follow ESR version, so 102 to 115 to 128
    updates with point releases approximately every month.

    In Ubuntu it was one of the reasons why they seized building .deb
    packages for browsers and switched to snap. Latest releases may rely on features unavailable in development tools from LTS distributions. A
    complete container independent of the system alleviates some issues.

    I like that Debian developers and maintainers are still able to build
    .deb packages for browsers.

    Most rolling release distributions do the same and you get the latest updates, features and fixes

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From George at Clug@21:1/5 to All on Sat Jan 18 02:20:01 2025
    On Saturday, 18-01-2025 at 11:47 John Hasler wrote:
    In the case of rsync Debian backported a fix. Therefor it gets the old version number with a suffix to indicate that Debian patched it. In the
    case of chromium upstream patched it and released the patched version
    with a new version number.

    John,

    Thanks for your reply.

    So this means that a patched version from :

    https://backports.debian.org/
    Backports are packages taken from the next Debian release (called "testing"), adjusted and recompiled for usage on Debian stable.

    as in:
    # bookworm-backports, previously on backports.debian.org
    deb https://deb.debian.org/debian/ bookworm-backports main contrib non-free non-free-firmware
    deb-src https://deb.debian.org/debian/ bookworm-backports main contrib non-free non-free-firmware


    Was copied into debian-security as in:
    deb https://security.debian.org/debian-security bookworm-security main contrib non-free non-free-firmware
    deb-src http://security.debian.org/debian-security bookworm-security main contrib non-free non-free-firmware

    which means as log as we have debian-security in our apt sources we still get the security patched version without needed to do anything special like specifically installing a bookworm-backports package.

    Please let me know if I am wrong.

    I rarely use backports, but when I do, I like the "adjusted and recompiled for usage on Debian stable" part, much better that grabbing packages from other distributions and just installing them, hoping there will not be issues. Though I had not realised
    that at times, a package would be moved/copied from backports into security, I would not have expected that action, but it does make sense when you explained it.

    Thanks,

    George.


    --
    John Hasler
    john@sugarbit.com
    Elmwood, WI USA



    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roberto =?iso-8859-1?Q?C=2E_S=E1nch@21:1/5 to George at Clug on Sat Jan 18 03:10:01 2025
    On Sat, Jan 18, 2025 at 12:14:16PM +1100, George at Clug wrote:

    I rarely use backports, but when I do, I like the "adjusted and
    recompiled for usage on Debian stable" part, much better that grabbing packages from other distributions and just installing them, hoping
    there will not be issues. Though I had not realised that at times, a
    package would be moved/copied from backports into security, I would
    not have expected that action, but it does make sense when you
    explained it.

    To be entirely clear, "at times, a package would be moved/copied from
    backports into security" is 100% NOT what happens.

    Backporting (at least in the Debian context) has two distinct meanings:

    - a specific patch or set of patches, which are prepared for a given
    version of a package, are adapted to an older version of that package
    - a newer version of some package is rebuilt for an older version of
    Debian (using the older tools and dependencies of that older Debian
    version)

    Both of these may happen within the context of a security update, the
    second also happens at times outside of a security context.

    For the "specific set of patches" case, many open source projects only
    maintain a single active development branch of their project. When a
    security vulnerability is announced, they fix it in that active release
    branch and then move on with life.

    When that happens, distro maintainers that are responsible for the
    security of older versions of these projects are left to grab the
    patches from upstream (usually in the form of one or more git commit
    diffs) and then adapt those patches to the older version. This activity
    is "backporting of one or more specific patches". This is what was done recently in the case of rsync.

    There is almost never a need to perform this sort of backporting outside
    of a security context, though it has happened on occasion.

    As far as the two types of full package backports, there is a security
    reason to this and a non-security reason.

    In the case of security fixes, certain projects make dedicated releases
    that restrict the fixes on a given branch to security and high severity
    bugs. Projects with a good reputation for this and with policies that
    align well with Debian's stable release criteria include Mozilla,
    Chromium, MariaDB, PostgreSQL and some others. In general, when they fix
    a vulnerability, they fix it in all actively maintained branches. When
    that happens and those branches include a new release in the same series
    as what is in Debian stable (which is often the case), then the security
    team is able to incorporate that new version of the package, build it
    for Debian stable and release that as a security update (with something
    like a +deb12uX version number).

    The other type of full package backport is not for security reasons but
    for reasons of wanting a newer version of a package (along with newer
    features) in an older Debian release. These packages are provided via
    the backports archive, they are not given any security support, and
    importantly they do not conform to Debian's stable release criteria.
    This means that these packages may have open security vulnerabilities,
    and they may have features and behaviors which differ substantially from
    what was released in Debian stable. In other words, they may break your existing whatever (programs you are compiling in the case of a library,
    scripts you've written in the case of an interperter, etc).

    Regards,

    -Roberto
    --
    Roberto C. Sánchez

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Monnier@21:1/5 to All on Sat Jan 18 03:20:01 2025
    That is why the rolling release method is superior to the old model
    used by others.

    Yes, and for the same reason non-rolling release distributions of
    GNU/Linux don't exist. Actually, for that same fundamental reason,
    there is only one GNU/Linux distribution (the one that "is
    superior").


    Stefan

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roberto =?iso-8859-1?Q?C=2E_S=E1nch@21:1/5 to pocket@homemail.com on Sat Jan 18 03:20:01 2025
    On Sat, Jan 18, 2025 at 02:36:34AM +0100, pocket@homemail.com wrote:

    That is why the rolling release method is superior to the old model used by others.

    s/superior/different/


    Most rolling release distributions do the same and you get the latest updates, features and fixes

    We know. Now please stop.

    If you really care about a rolling release and that is the only thing
    you are interested in discussing, then debian-user is clearly not the
    right place to be. You can easily find a place that has the type of
    discussion that you are looking for, and the rest of us would thank you
    kindly for availing yourself of one or more of those options.

    Regards,

    -Roberto

    --
    Roberto C. Sánchez

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From pocket@homemail.com@21:1/5 to All on Sat Jan 18 03:20:01 2025
    Sent: Friday, January 17, 2025 at 9:10 PM
    From: "Roberto C. Sánchez" <roberto@debian.org>
    To: debian-user@lists.debian.org
    Subject: Re: Are Debian packages updated within a release?

    On Sat, Jan 18, 2025 at 02:36:34AM +0100, pocket@homemail.com wrote:

    That is why the rolling release method is superior to the old model used by others.

    s/superior/different/

    's/different/superior/g'


    Most rolling release distributions do the same and you get the latest updates, features and fixes

    We know. Now please stop.

    If you really care about a rolling release and that is the only thing
    you are interested in discussing, then debian-user is clearly not the
    right place to be. You can easily find a place that has the type of discussion that you are looking for, and the rest of us would thank you kindly for availing yourself of one or more of those options.


    Oh I see you would rather stick your fingers in your ears and pretend all is well.

    I determine what is right for me, you certainly don't

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From pocket@homemail.com@21:1/5 to All on Sat Jan 18 03:30:01 2025
    Sent: Friday, January 17, 2025 at 9:10 PM
    From: "Stefan Monnier" <monnier@iro.umontreal.ca>
    To: debian-user@lists.debian.org
    Subject: Re: Are Debian packages updated within a release?

    That is why the rolling release method is superior to the old model
    used by others.

    Yes, and for the same reason non-rolling release distributions of
    GNU/Linux don't exist. Actually, for that same fundamental reason,
    there is only one GNU/Linux distribution (the one that "is
    superior").


    Stefan


    All your post end up in the spam directory of my account on mail.com.
    I need to leave them there.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From George at Clug@21:1/5 to All on Sat Jan 18 05:10:01 2025
    On Saturday, 18-01-2025 at 12:30 Max Nikulin wrote:
    On 18/01/2025 07:34, George at Clug wrote:
    Would I be correct in assuming this is because the version of Chromium
    (as in its features) are being updated within Debian 12

    Major browsers are an exception. Security fixes are frequent and
    massive. The upstream teams do not maintain stable versions with support period comparable to Debian stable. It would be too much burden for
    Debian maintainers to track and backport security fixes.

    That is why latest Chromium release is available in bookworm. Firefox
    and Thunderbird packages follow ESR version, so 102 to 115 to 128
    updates with point releases approximately every month.

    In Ubuntu it was one of the reasons why they seized building .deb
    packages for browsers and switched to snap. Latest releases may rely on features unavailable in development tools from LTS distributions. A
    complete container independent of the system alleviates some issues.

    I like that Debian developers and maintainers are still able to build
    .deb packages for browsers.

    +1 (yes, impressive, and my thanks to them)


    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Charles Curley@21:1/5 to pocket@homemail.com on Sat Jan 18 05:10:01 2025
    On Sat, 18 Jan 2025 03:21:48 +0100
    pocket@homemail.com wrote:

    Stefan


    All your post end up in the spam directory of my account on mail.com.
    I need to leave them there.

    Oh, come on, Pocket. He was trolling you, apparently successfully.
    Turnabout is fair play.

    --
    Does anybody read signatures any more?

    https://charlescurley.com
    https://charlescurley.com/blog/

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From gene heskett@21:1/5 to Max Nikulin on Sat Jan 18 07:20:01 2025
    On 1/17/25 20:30, Max Nikulin wrote:
    On 18/01/2025 07:34, George at Clug wrote:
    Would I be correct in assuming this is because the version of Chromium
    (as in its features) are being updated within  Debian 12

    Major browsers are an exception. Security fixes are frequent and
    massive. The upstream teams do not maintain stable versions with
    support period comparable to Debian stable. It would be too much
    burden for Debian maintainers to track and backport security fixes.

    That is why latest Chromium release is available in bookworm. Firefox
    and Thunderbird packages follow ESR version, so 102 to 115 to 128
    updates with point releases approximately every month.

    Chromium has been removed here, http://localhost:80 used by my 3d
    printers for remote display and control is redirected to google, which
    of course has no clue which of the 10 billion localhost's is meant. 
    Firefox still works for http://aliias:80

    In Ubuntu it was one of the reasons why they seized building .deb
    packages for browsers and switched to snap. Latest releases may rely
    on features unavailable in development tools from LTS distributions. A complete container independent of the system alleviates some issues.

    I like that Debian developers and maintainers are still able to build
    .deb packages for browsers.

    unfortunately, not too stable here. t-bird crashes while updating my
    local imap cache, so I'm running the beta version.

    Cheers, Gene Heskett, CET.

    --
    "There are four boxes to be used in defense of liberty:
    soap, ballot, jury, and ammo. Please use in that order."
    -Ed Howdershelt (Author, 1940)
    If we desire respect for the law, we must first make the law respectable.
    - Louis D. Brandeis

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From tomas@tuxteam.de@21:1/5 to pocket@homemail.com on Sat Jan 18 07:50:02 2025
    On Sat, Jan 18, 2025 at 03:19:16AM +0100, pocket@homemail.com wrote:

    [...]

    Oh I see you would rather stick your fingers in your ears and pretend all is well.

    In some cases, that's the right idea, yes. You kind of prove it.

    I determine what is right for me, you certainly don't

    Exactly. That's the same as others do.

    Let me attempt once more, after that, I'll give up.

    See, by now, everyone and their cat in debian-user knows you prefer rolling releases. That's fine, they have their place, their uses and their users.

    Debian is not, and it goes to some lengths to keep a stable version "stable", meaning that things move as little as possible. That has its reasons, its
    uses, and its users.

    Coming to debian-user to whine about why Debian isn't rolling is, therefore, pretty useless. Doing it in an as arrogant way as you are doing it is not
    only that, but is downright annoying.

    Don't be surprised then, when you get annoyed answers.

    You want rsync bugs in debian stable to get fixed? Go, help out. The bug mailing list for the package is open, as most of Debian things are.

    You want to annoy people? Go away.

    Cheers
    --
    t

    -----BEGIN PGP SIGNATURE-----

    iF0EABECAB0WIQRp53liolZD6iXhAoIFyCz1etHaRgUCZ4tO5gAKCRAFyCz1etHa Rv28AJ9xd4nIYrOrTPYsHVethybIrDTmowCfTEUo5pk5f/NvoJWRY4EWtp1EMvY=
    =drZm
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From George at Clug@21:1/5 to All on Sat Jan 18 09:20:01 2025
    Thanks Roberto, and others who tried to explain Backporting, I will need to read this and think about it for a while.

    To make comment, I stay away from FlatPacks (the MS world tried this kind of technology once, I wonder if they still do)?

    I prefer stability and hence Debian Stable with its "not rolling release". Even if I don't have yesterday's release, so far that has not been an issue I cannot get around.

    Nothing is "secure", just maybe more secure that other ways.
    Nothing is "stable", just maybe more stable than other ways.

    Keeping the above two points in mind, keeps me from being too disappointed or arrogant.

    I am still waiting for "Latest Beta Version: 565.X.X" to move to "Latest Production Branch Version", until then AMD, Radeon video cards it is.
    https://www.nvidia.com/en-us/drivers/unix/

    I will keep reading debian-user to keep updated.

    George.

    On Saturday, 18-01-2025 at 13:06 Roberto C. Sánchez wrote:
    On Sat, Jan 18, 2025 at 12:14:16PM +1100, George at Clug wrote:

    I rarely use backports, but when I do, I like the "adjusted and
    recompiled for usage on Debian stable" part, much better that grabbing packages from other distributions and just installing them, hoping
    there will not be issues. Though I had not realised that at times, a package would be moved/copied from backports into security, I would
    not have expected that action, but it does make sense when you
    explained it.

    To be entirely clear, "at times, a package would be moved/copied from backports into security" is 100% NOT what happens.

    Backporting (at least in the Debian context) has two distinct meanings:

    - a specific patch or set of patches, which are prepared for a given
    version of a package, are adapted to an older version of that package
    - a newer version of some package is rebuilt for an older version of
    Debian (using the older tools and dependencies of that older Debian
    version)

    Both of these may happen within the context of a security update, the
    second also happens at times outside of a security context.

    For the "specific set of patches" case, many open source projects only maintain a single active development branch of their project. When a
    security vulnerability is announced, they fix it in that active release branch and then move on with life.

    When that happens, distro maintainers that are responsible for the
    security of older versions of these projects are left to grab the
    patches from upstream (usually in the form of one or more git commit
    diffs) and then adapt those patches to the older version. This activity
    is "backporting of one or more specific patches". This is what was done recently in the case of rsync.

    There is almost never a need to perform this sort of backporting outside
    of a security context, though it has happened on occasion.

    As far as the two types of full package backports, there is a security
    reason to this and a non-security reason.

    In the case of security fixes, certain projects make dedicated releases
    that restrict the fixes on a given branch to security and high severity
    bugs. Projects with a good reputation for this and with policies that
    align well with Debian's stable release criteria include Mozilla,
    Chromium, MariaDB, PostgreSQL and some others. In general, when they fix
    a vulnerability, they fix it in all actively maintained branches. When
    that happens and those branches include a new release in the same series
    as what is in Debian stable (which is often the case), then the security
    team is able to incorporate that new version of the package, build it
    for Debian stable and release that as a security update (with something
    like a +deb12uX version number).

    The other type of full package backport is not for security reasons but
    for reasons of wanting a newer version of a package (along with newer features) in an older Debian release. These packages are provided via
    the backports archive, they are not given any security support, and importantly they do not conform to Debian's stable release criteria.
    This means that these packages may have open security vulnerabilities,
    and they may have features and behaviors which differ substantially from
    what was released in Debian stable. In other words, they may break your existing whatever (programs you are compiling in the case of a library, scripts you've written in the case of an interperter, etc).

    Regards,

    -Roberto
    --
    Roberto C. Sánchez



    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andy Smith@21:1/5 to pocket@homemail.com on Sat Jan 18 14:50:01 2025
    Hi,

    On Sat, Jan 18, 2025 at 03:19:16AM +0100, pocket@homemail.com wrote:
    Oh I see you would rather stick your fingers in your ears and pretend all is well.

    I determine what is right for me, you certainly don't

    Why do you continue to post to this list if you believe that there are
    Linux distributions other than Debian that are unconditionally superior
    to it?

    You have also posted a number of times that you will not continue to
    post here, yet you don't seem to follow through on that. You come back,
    usually to post about how Debian is inferior.

    Do you need outside assistance in not posting here?

    Thanks,
    Andy

    --
    https://bitfolk.com/ -- No-nonsense VPS hosting

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andy Smith@21:1/5 to Nicolas George on Sat Jan 18 15:10:01 2025
    Hi,

    On Sat, Jan 18, 2025 at 02:53:23PM +0100, Nicolas George wrote:
    Andy Smith (12025-01-18):
    Why do you continue to post to this list

    Why do you continue replying?

    Sometimes in an attempt to understand Pocket's behaviour. I mean, I'm
    aware it's easy to just write it off as trolling.

    Other times because some serious misinformation has been posted and is
    likely to confuse people. I received two off-list questions about that
    rsync thread that were in part confused over whether things had been
    patched or not, after Pocket's confused or deliberate posting of
    misinfo.

    One of them also believed that Pocket had caused the thread to be
    moderated as their own posting didn't show up, but I think that was
    probably user error or the vagaries of email, since mine did.

    Thanks,
    Andy

    --
    https://bitfolk.com/ -- No-nonsense VPS hosting

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Nicolas George@21:1/5 to All on Sat Jan 18 15:00:02 2025
    Andy Smith (12025-01-18):
    Why do you continue to post to this list

    Why do you continue replying?

    Regards,

    --
    Nicolas George

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andy Smith@21:1/5 to George at Clug on Sat Jan 18 15:10:01 2025
    Hi,

    On Sat, Jan 18, 2025 at 12:14:16PM +1100, George at Clug wrote:
    On Saturday, 18-01-2025 at 11:47 John Hasler wrote:
    In the case of rsync Debian backported a fix. Therefor it gets the old version number with a suffix to indicate that Debian patched it. In the case of chromium upstream patched it and released the patched version
    with a new version number.

    […]

    So this means that a patched version from :

    https://backports.debian.org/

    I will stop you there because you are confusing the backports
    repository, which contains later versions of software, with the more
    strict definition of "backporting a security patch" which is how Debian generally gets security patches into a stable release.

    After a stable release of Debian is made, future package updates will
    come from the stable-updates suite (e.g. bookworm-updates in the case
    of Debian 12). These updates will in most cases contain the same version
    of the software from stable suite but with a fix for one or more
    security bugs built for it.

    In the concrete case of rsync as recently discussed on this list, the
    *Debian* package version as reported by dpkg would be 3.2.7-1 when it
    was originally installed from the Debian 12 release media, but would be
    updated to 3.2.7-1+deb12u2 through package updates that came via the bookworm-updates suite in your sources.list. All the time, the actual
    program is going to report 3.2.7 when you type "rsync --version",
    because that is what it is.

    When you install Debian it usually enables security updates via an
    -updates suite, so every user of stable should be getting security
    updates.

    One particular consequence of this process of making a stable release is
    that generally no new features will ever come to the packages in it.
    rsync's feature set will always remain as it was at 3.2.7 and only
    security issues, and severe bugs introduced when trying to fix those
    issues, will appear within the lifetime of that Debian release.

    By contrast the backports repository is a whole other optional
    repository that exists to provide entirely newer versions of some
    packages for people who need them:

    Backports are packages taken from the next Debian release (called
    "testing"), adjusted and recompiled for usage on Debian stable.

    Those packages would be based on a newer upstream release, and would
    include the new features of those newer versions.

    Only a limited number of packages have backports. There isn't currently
    an rsync in bookworm-backports, for example.

    as log as we have debian-security in our apt sources we still get the security patched version without needed to do anything special like specifically installing a bookworm-backports package.

    Yes, -backports is a whole other thing and is not involved in the
    creation of stable security updates.

    Thanks,
    Andy

    --
    https://bitfolk.com/ -- No-nonsense VPS hosting

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From fxkl47BF@protonmail.com@21:1/5 to Nicolas George on Sat Jan 18 15:20:01 2025
    On Sat, 18 Jan 2025, Nicolas George wrote:

    Andy Smith (12025-01-18):
    Why do you continue to post to this list

    Why do you continue replying?

    maybe pocket is an ai toy designed to annoy andy smith

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Nicolas George@21:1/5 to All on Sat Jan 18 15:30:01 2025
    Andy Smith (12025-01-18):
    One particular consequence of this process of making a stable release is
    that generally no new features will ever come to the packages in it.

    No new *features* is not the point of Debian stable, though, only a side effect.

    The point is: no changes in behavior.

    When you upgrade to a new version of a program, maybe you need to
    replace “whitelist” by “allowlist” because somebody had their fifteen minutes of celebrity by pointing it is problematic, otherwise it will
    not start.

    Or maybe the program you were running in a crontab will suddenly start
    asking for a confirmation interactively.

    Or maybe -D used to mean to not delete all the files and now, for
    consistency it means to delete all the files.

    When running Debian stable, you can trust the distribution it will not
    happen: you can upgrade, your scripts will not stop working, your
    config files will not need updating.

    Only need to schedule for unexpected software breakage once every two to
    five years.

    Regards,

    --
    Nicolas George

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roberto =?iso-8859-1?Q?C=2E_S=E1nch@21:1/5 to George at Clug on Sat Jan 18 15:50:02 2025
    On Sat, Jan 18, 2025 at 07:12:30PM +1100, George at Clug wrote:

    Thanks Roberto, and others who tried to explain Backporting, I will
    need to read this and think about it for a while.

    To make comment, I stay away from FlatPacks (the MS world tried this
    kind of technology once, I wonder if they still do)?

    I prefer stability and hence Debian Stable with its "not rolling
    release". Even if I don't have yesterday's release, so far that has
    not been an issue I cannot get around.

    Nothing is "secure", just maybe more secure that other ways.
    Nothing is "stable", just maybe more stable than other ways.

    The notions of "secure" and "stable" require that you define those terms
    for your specific use case. "Secure" means one thing if your threat
    model is jackbooted thugs crashing through your door in the middle of
    the night while you sleep and it means something different if your
    threat model is script kiddies selling their services via task rabbit or something like that and something else if you are concerned about
    trusted insiders exploiting your data.

    A similar concept applies for "stable". Sometimes "stable" means
    "behavior does not change, to the maximum extend possible" and other
    times it means "new features are deployed in order to continue being
    able to interoperate with some other system".

    The general threat model for "secure" in Debian (as in how the Security
    Team tends to approach assessment and remediation of vulnerabilities)
    tends to lean in the direction of prioritizing vulnerabilities with
    remote exploitability and those which do not require authenticated
    access (or low privileges). And for "stable" it definitely leans hard
    toward "no behavior change at all when possible, and only minimal change
    when change is unavoidable".

    If your needs for "secure" and "stable" don't line up with how the
    Debian Security Team approaches those things, then it is worth
    considering alternatives.

    I hope this helps you to understand the overall approach.

    Regards,

    -Roberto

    --
    Roberto C. Sánchez

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From George at Clug@21:1/5 to All on Sat Jan 18 22:30:01 2025
    On Sunday, 19-01-2025 at 01:21 Nicolas George wrote:
    Andy Smith (12025-01-18):
    One particular consequence of this process of making a stable release is that generally no new features will ever come to the packages in it.

    No new *features* is not the point of Debian stable, though, only a side effect.

    The point is: no changes in behavior.

    When you upgrade to a new version of a program, maybe you need to
    replace “whitelist” by “allowlist” because somebody had their fifteen minutes of celebrity by pointing it is problematic, otherwise it will
    not start.

    Or maybe the program you were running in a crontab will suddenly start
    asking for a confirmation interactively.

    Or maybe -D used to mean to not delete all the files and now, for
    consistency it means to delete all the files.

    When running Debian stable, you can trust the distribution it will not happen: you can upgrade, your scripts will not stop working, your
    config files will not need updating.

    Only need to schedule for unexpected software breakage once every two to
    five years.

    And this is why I like Debian Stable.

    I once maintained a Mail Server, an update introduced a totally different way to manage configuration files and the change broke the mail server until the settings were translated to the new settings. I still recall the trauma, lol.

    George.


    Regards,

    --
    Nicolas George



    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From John Crawley@21:1/5 to Andy Smith on Sun Jan 19 09:40:02 2025
    On 18/01/2025 23:01, Andy Smith wrote:
    After a stable release of Debian is made, future package updates will
    come from the stable-updates suite (e.g. bookworm-updates in the case
    of Debian 12). These updates will in most cases contain the same version
    of the software from stable suite but with a fix for one or more
    security bugs built for it.

    In the concrete case of rsync as recently discussed on this list, the *Debian* package version as reported by dpkg would be 3.2.7-1 when it
    was originally installed from the Debian 12 release media, but would be updated to 3.2.7-1+deb12u2 through package updates that came via the bookworm-updates suite in your sources.list. All the time, the actual
    program is going to report 3.2.7 when you type "rsync --version",
    because that is what it is.

    When you install Debian it usually enables security updates via an
    -updates suite, so every user of stable should be getting security
    updates.

    The *-updates suite is something different from security upgrades.

    To get bookworm security upgrades the necessary apt line is something like:

    deb https://deb.debian.org/debian-security bookworm-security main contrib non-free non-free-firmware

    The bookworm-updates suite is a channel for updates that will eventually arrive in a point release, like this from my debian-installer installed sources.list:

    # bookworm-updates, to get updates before a point release is made;
    # see https://www.debian.org/doc/manuals/debian-reference/ch02.en.html#_updates_and_backports
    deb https://deb.debian.org/debian bookworm-updates main contrib non-free non-free-firmware

    --
    John

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andy Smith@21:1/5 to John Crawley on Sun Jan 19 23:00:01 2025
    Hi,

    On Sun, Jan 19, 2025 at 05:16:51PM +0900, John Crawley wrote:
    On 18/01/2025 23:01, Andy Smith wrote:
    The *-updates suite is something different from security upgrades.

    To get bookworm security upgrades the necessary apt line is something like:

    deb https://deb.debian.org/debian-security bookworm-security main contrib non-free non-free-firmware

    Yep, absolutely right, my mistake. It's normally enabled by default. You
    can see when you look at an example like rsync:

    https://packages.debian.org/bookworm/rsync

    that the download link comes from security.debian.org (which deb.debian.org/debian-security is a mirror of).

    Thanks,
    ANdy

    --
    https://bitfolk.com/ -- No-nonsense VPS hosting

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)