On Tue, Sep 04, 2018 at 12:12:56AM +0200, Sebastian Andrzej Siewior wrote:
> Package: release.debian.org
> User: release.debian....@packages.debian.org
> Usertags: pu
> Tags: stretch
> Severity: normal

I can't speak for the SRMs, but personally I'm in favour of this. In
fact, I had been meaning to contact you and Kurt wrt switching to
releasing the openssl micro releases for buster-security onwards (but
I think it's ok to retroactively apply this for stretch as well).

We've had good results of shipping upstream micro releases in -security
for selected packages which sane/well-established release/QA processes
and I think openssl is a sensible candidate.
Apart from the pure security fixes, there's a grey area of changes
which are important to also get to stable (and there have been cases
where a bugfix shipped in an openssl stable release turned out to be
security-relevant later on).

(I've been deploying customs debs of the 1.0.2x and 1.1.0x openssl releases
at work and I haven't run into any compatibility issues/API issues during
that).

> The BTS bugs #903566 and #907457 are two examples which were raised
> within Debian.

It also allows to build some software in stretch which doesn't work
with 1.1.0f, e.g. nodejs 10 requires 1.1.0g as it depends on some API
functions only introduced there.

Cheers,
        Moritz

Reply via email to