On Thu, Jul 22, 2021 at 04:00:26PM +0200, Marco Möller wrote:
> On 22.07.21 13:49, Tixy wrote:
> > On Thu, 2021-07-22 at 12:23 +0200, Marco Möller wrote:
> > > Hello everyone! The Debian development branch "bullseye"(/testing) is in
> > > status "full freeze", if I am correctly informed, and packages from
> > > /unstable are for quite some time already no more automatically moved
> > > from /unstable to /testing.
> > > Do you know how Debian handles situations like the current
> > > CVE-2021-33909 patched kernel being already in /unstable but for sure
> > > also /testing, the soon /stable, would benefit from receiving the patch
> > > as provided in 5.10.46-2 ?
> > > The patched version I am speaking about is this:
> > > linux-image-5.10.0-8-amd64/unstable 5.10.46-2 amd64
> > > In my "bullseye" installation, which I update daily, I still have
> > > linux-image-5.10.0-7-amd64/testing,now 5.10.40-1 amd64
> > 
> > 5.10.46-2 is now in testing, I've just updated to it.
> > 
> > Presumably the process is as described in full freeze announcement,
> > i.e. package developer makes unblock request to allow migration into
> > testing and release team grant it if they think it meets the criteria
> > for release.
> > 
> 
> It meanwhile arrived also in the mirror which I am using. Nice.
> 
> So, although it is full freeze time, the former kernel with all its already
> known and tested functionality will not be specially patched, but the new
> kernel is taken although it besides containing the patch might also bring
> changed functionality?
> Simply asking for curiosity, not that it would be of further importance for
> me.
> 

That's how it works. Normally, unstable -> testing would just migrate. Security 
fixes to stable would be made in the normal course of events. 

Bullseye / Debian 11 is now in really hard freeze - ready for release very 
shortly. So security fixes are more or less the only things going in.
Each of them is hand approved so as not to break everything else. The very 
latest kernel/systemd security update is a big deal - so it got
hand approved very quickly.

In general, any bug fixed package overrides all the files of the previous 
package: if there's a package foo-1.0.0 and foo1.0.1 is a security fix,
foo1.0.1 wll replace all the previous files from foo1.0.0. There are 
exceptions, especially where there are modified configuration files: in that
case, there will normally be a question asked sa to whether to update the files 
or not. In some cases, the new package will leave a sample config 
file (with a dpkg.new extension, I think) in the correct place to be looked at 
and edited as necessary.

All the very best, as ever,

Andy Cater 

Reply via email to