unblock: webkit2gtk/2.16.3-2 (was: Re: Mitigating the problem of limited security support)

2017-06-01 Thread Jeremy Bicha
On Tue, May 30, 2017 at 5:47 PM, Jeremy Bicha wrote: > On Tue, May 30, 2017 at 5:32 PM, Moritz Mühlenhoff wrote: >> You're best technical bet would be to upgrade to new webkit releases in >> stretch point releases, this would allow proper binNMUs and allow >> people to testdrive via s-p-u. But th

Re: Mitigating the problem of limited security support

2017-05-30 Thread Jeremy Bicha
On Tue, May 30, 2017 at 5:32 PM, Moritz Mühlenhoff wrote: > You're best technical bet would be to upgrade to new webkit releases in > stretch point releases, this would allow proper binNMUs and allow > people to testdrive via s-p-u. But that's up for the SRMs to > decide (and I doubt they want to

Re: Mitigating the problem of limited security support

2017-05-30 Thread Moritz Mühlenhoff
Alberto Garcia wrote: > The problem is that point releases with fixes for CVEs can also > introduce regressions (#855103, introduced in 2.14.4). That one was > fixed quickly, though, but that's why I was asking. The security archive doesn't scale to play catchup with all those rdeps. There's too m

Re: Mitigating the problem of limited security support

2017-05-29 Thread Alberto Garcia
On Sun, May 28, 2017 at 09:32:23PM -0400, Jeremy Bicha wrote: > > The good news is that the first kind of problems are detected and > > fixed immediately, so waiting a couple of weeks before uploading > > the releases to debian-security could be an option (is that what > > Ubuntu does?). > > For t

Re: Mitigating the problem of limited security support

2017-05-28 Thread Jeremy Bicha
On Sun, May 28, 2017 at 7:19 PM, Alberto Garcia wrote: > The good news is that the first kind of problems are detected and > fixed immediately, so waiting a couple of weeks before uploading > the releases to debian-security could be an option (is that what > Ubuntu does?). For the past 9 months,

Re: Mitigating the problem of limited security support

2017-05-28 Thread Alberto Garcia
On 2017-05-27 23:49, Moritz Mühlenhoff wrote: > The "browser exception" applies to Chromium and Firefox, which are > standalone packages (sans a few addons breaking), but unless webkit > provides a long term branch with API stability guarantees, that's > not a workable. "Rebase to a new 2.x branch

Re: Mitigating the problem of limited security support

2017-05-27 Thread Jeremy Bicha
On Sat, May 27, 2017 at 5:49 PM, Moritz Mühlenhoff wrote: > The "browser exception" applies to Chromium and Firefox, which are > standalone packages (sans a few addons breaking), but unless webkit > provides a long term branch with API stability guarantees, that's > not a workable. "Rebase to a ne

Re: Mitigating the problem of limited security support

2017-05-27 Thread Moritz Mühlenhoff
Jeremy Bicha schrieb: > understanding is that the Debian Security team has absolutely refused > to extend the "browser exception" (to allow major new versions) to > webkit2gtk, The "browser exception" applies to Chromium and Firefox, which are standalone packages (sans a few addons breaking), but

Re: Mitigating the problem of limited security support

2017-05-21 Thread Jeremy Bicha
On Sun, May 21, 2017 at 9:43 AM, Adrian Bunk wrote: > 2. WebKitGTK+ The primary package of concern here in Debian Stretch is webkit2gtk . For a year now, Ubuntu has been updating webkit2gtk [1] as security updates [2] just fine. Ubuntu 16.04 LTS started with 2.10 and has upgraded it to the majo

Mitigating the problem of limited security support

2017-05-21 Thread Adrian Bunk
Both the jessie release notes [1] and the draft stretch release notes [2] contain the following text: 5.2.1. Security status of web browsers Debian 9 includes several browser engines which are affected by a steady stream of security vulnerabilities. The high rate of vulnerabilities and