* Michael Gilbert <mgilb...@debian.org>, 2014-06-22, 04:44:
If remotely exploitable root security hole is not “critical” and is not a security problem, then I don't know what is.

It is not appropriate to burden the security team about parts of the archive that clearly don't receive security support:
https://www.debian.org/security/faq#contrib

The “security” tag is defined as “describes a security problem in a package”, not “the Security Team should feel obliged to fix it”. BTS documentation doesn't give Security Team the power to decide about bug severities either.

If correctly tagged bugs against contrib or non-free packages create burden for the Security Team, then they should fix their workflow, and possibly also remove this sentence from their FAQ, to reflect reality: “If it is possible to fix the problem, and the package maintainer or someone else provides correct updated packages, then the security team will generally process them and release an advisory.”

Lack of security support is not the same thing as opposition to security, and I expect the Security Team to not engage in the latter.

If it was an upstream bug AND we couldn't get it fixed ourselves (due to licensing or lack of source) AND upstream was not willing to fix it either, then that would be justification for the wontfix tag (but not for any changes you made).

However, this is a bug specifically introduced by the Debian package. There is no excuse for not fixing it.

Where did you see wontfix?

I didn't. I used the future unreal conditional, which is used to talk about imaginary situations in the future. (But IANA native speaker of English, so I welcome criticism of my grammar.)

--
Jakub Wilk


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to