Hi,

On Thu, 12 Feb 2026 09:59:58 +0700 Arnaud Rebillout
<[email protected]> wrote:
> * Reinhard Tartler <[email protected]> [2025-12-03 06:51]:
>  >- Bump Trixie to 1.2.8/1.3.3 (i.e., introduce new source "runc-app 
> that produces the `runc` binary", like Ubuntu).
> 
> Indeed, Ubuntu ships runc 1.3.3 in 22.04 LTS, 24.04 LTS and newer. 
> However their runc source package embeds the complete vendor tree,
and 
> their Build-Depends are minimal. That's why it's fairly easy to
rebuild 
> this package for older Ubuntu releases.
> 
> However in Debian we don't use the vendor tree, so it's a completely 
> different story.
> 
> I tried to rebuild runc 1.3.3 (currently in Sid) against Debian
Trixie. 
> Result: we need to bump 4 Build-Depends just to meet the constraints.
I 
> didn't go further.
> 
> I tried something more realistic: rebuilding runc 1.2.9 against
Trixie. 
> Result: I had to bump 3 Build-Depends to fix FTBFS (as a shortcut, I 
> just vendored it). After that, the package is built. I didn't test
it.
> 
> At this point I have two concerns:
> - I'm not sure it's feasible to upload new versions of the Build-
Depends 
> in Trixie: we risk break builds or regressions in other packages that
> use those Build-Depends.
> - I'm also interested in supporting Bookworm and Bullseye, and it's 
> going to be even harder, or downright impossible, to rebuild runc
1.2.9 
> aginst those old releases.
> 
> So, in short, and forgive me for stating the obvious: I think the 
> approach of providing new versions of runc in old versions of Debian
can 
> only work if we use the embedded vendor tree to build it, just like 
> Ubuntu does. *Do we want to do that* ?
> 
> Another aspect that wasn't discussed yet: src:runc also provides the 
> library golang-github-opencontainers-runc-dev. I don't know if the
CVEs 
> affect this code and therefore the reverse Build-Depends of it.
Reinhard 
> do you have any idea about that?
> 
> Again, opinions from everyone welcome. Best,

Thanks for working on the backports and for identifying the potential
issues — that is very helpful.

I had a similar discussion in Ubuntu a few years ago. As you’ve already
noticed, we eventually decided that it was preferable to keep updating
to newer upstream versions while avoiding breakage of reverse
dependencies in the archive.

The approach we took was to create separate source packages (e.g.
src:runc-app, and similarly for containerd and docker.io) with embedded
build dependencies, making them self-contained and not affecting other
packages in the archive. Our assessment at the time was that most users
rely primarily on the application rather than the provided library.
Therefore, ensuring that the application itself receives security fixes
— even if not an ideal solution — seemed better than leaving users with
known vulnerabilities.

The container ecosystem evolves very quickly, which makes backporting
particularly time-consuming and, in many cases, still results in
breaking changes.

I wonder whether Debian would consider a similar approach in the
interest of users. We are all aware of the downsides: vendoring build
dependencies, introducing larger updates in stable releases, and the
general trade-offs involved. However, the alternative is continuing to
ship versions with known vulnerabilities. In the long run, users may
decide to stop relying on the distribution packages and instead turn to
external sources.

These are just my thoughts on the matter, and I’m interested in hearing
what others think.

Lucas Kanashiro.

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to