#5650 HIGH Update.: Ensure upstream Fedora bugs fixes/security updates for packages we use...

Zarro Boogs per Child bugtracker at laptop.org
Mon Dec 31 11:56:45 EST 2007


#5650: Ensure upstream Fedora bugs fixes/security updates for packages we use...
---------------------+------------------------------------------------------
  Reporter:  jg      |       Owner:  dgilmore
      Type:  defect  |      Status:  new     
  Priority:  high    |   Milestone:  Update.1
 Component:  distro  |     Version:          
Resolution:          |    Keywords:          
  Verified:  0       |    Blocking:          
 Blockedby:          |  
---------------------+------------------------------------------------------
Changes (by jg):

 * cc: krstic, mstone (added)


Comment:

 I gather from IRC discussion these are a backlog of packages that have
 been gradually hitting joyride from upstream, but not made update.1.

 Given the list of packages, many of these are likely security updates.
 Our lack of insight into upstream fedora changes, however, needs repair.

 At this point in our release cycle, at most we should be accepting
 security patches or fixes to bugs we have ourselves observed in update.1
 itself. Security updates are vetted with extreme care, and we'd have to
 face them anyway.

 1) we need to get our build announcer to extract the information in the
 RPM as to what the Fedora upstream change is, so we see these in ways
 we'll notice.

 2) There are a number of these packages we must investigate very carefully
 asap: python, matchbox to name a couple that are central to us.  Though
 likely innocuous (we possibly would have noticed) we might not notice and
 get bit later, so homework is in order.

 3) from this date out, update.1 builds should not be getting anything from
 upstream F7 without explicit individual action. (which I believe is
 already the case).

 4) we need a process by which security and other fedora bug fixes get
 routed to the right person in OLPC for review.  Dennis is on the fedora
 security mailing list; I'm on the X.org security mailing list: we should
 cover other core technologies as well: e.g. python, firefox(!) to name a
 few.

 Dennis, I think the action items here are mostly on you, except for the
 analysis of any changes (as I said, I'm much more concerned with the non-
 security changes that may be occurring), though we should not rely
 entirely on upstream there anyway.

 The action item on me is ensuring we have representation on the security
 mailing lists of the key upstream projects, essential when we are working
 with upstream development (e.g. X.org, firefox) and running more recent
 versions than are in mainline distributions.

-- 
Ticket URL: <http://dev.laptop.org/ticket/5650#comment:2>
One Laptop Per Child <http://dev.laptop.org>
OLPC bug tracking system



More information about the Bugs mailing list