On jeu., 2013-07-04 at 12:51 +0200, Paul Dreik wrote:
> 2013-07-03 22:58, Yves-Alexis Perez skrev:
> > On mer., 2013-07-03 at 10:25 +0200, Paul Dreik wrote:
> >> Notice: add_option was called with an argument that
> >> is <strong>deprecated</strong>
> >>  since version 2.3 with no alternative available. in
> >> /usr/share/wordpress/wp-includes/functions.php on line 2927
> >> (repeated three times)
> > 
> > My guess would be a plugin/theme not compatible with recent (post 2.3)
> > wordpress. Do you have something like that installed?

> So, it seems like upgrading to a new version requires logging in to the
> admin section to get it working properly.

Yes. The DSA text might not be clear enough about that, but it's the
exact same procedure you would have to follow if you updated to a new
Debian version, or if you updated using Wordpress tarballs.

>  I assume this is also thye
> case for the debian packaged version. I think it is really unfriendly of
> wordpress to not give any output at all in this situation, not even when
> enabling debugging.

I kind of agree here.

>  Maybe most people update through the web interface
> rather than the distributions package updates and never get such problems.


> 
> According to the documentation at
> http://codex.wordpress.org/Updating_WordPress#Step_2:_Update_your_installation
> updating the database through the web interface is the right thing to
> do. I do not think it would hurt to mention it among the other news
> displayed when updating the package.

Yes, I think we'll try to add something like that in the next DSA text
and in the NEWS.Debian file. It's might be kind of obvious for people
updating wordpress at every upstream release, but that's the kind of
thing people forget, especially if we skip updates in Debian.

>  People run debian stable for a
> reason, and security updates that bump the version should in my opinion
> be careful about breaking existing installations. I hope I contributed
> instead of only complaining by troubleshooting and reporting my findings.

The procedure to update to a complete new upstream version in a stable
Debian release is anything but trouble free. We try to avoid that kind
of thing, but here we don't have much choice, identifying each and every
vulnerability fixed in a new release is too time consuming (when even
possible) and backporting the fixes is just not possible considering the
resources we have. That means end-users have to take care when
upgrading. We try to warn them in the DSA text but there's always room
for improvement.

Regards,
-- 
Yves-Alexis


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to