If you ever have run a Linux-based operating system you are probably aware of the way that software is usually distributed on them: Using a software repository.
Repositories are great for numerous reasons. Want to install an application on Debian? Easy. Just execute
apt-get install ffmpeg and ffmpeg has been installed. Updating? A quick
apt-get update plus
apt-get upgrade and all is done.
As you can clearly see using a repository gives you the great advantage of making it easy for you to update and install applications.
One needs to be aware of the fact that software repositories are not automagically maintained. There are people out there (packagers) whose responsibility it is:
So youre basically moving the responsibility of this task to another entity. And this a good thing to do. Time is sparse and precious, so outsourcing tasks like these is often a sensible thing to do.
Furthermore Linux on the server would probably never have received the kind of traction it has nowadays if packages would not be there.
This certainly sounds all like great stuff. So using packages directly from your distribution just sounds like the right thing to do. Right?
The truth is a little bit more complex though. First of all, you need to completely trust your packagers. This does not only apply to the risk that they could hide malicious code in the packages, it goes much further. These are the people that timely need to react in case a vulnerability in an application is found to publish an update.
Lets talk a little bit more about packagers. In case of distributions such as Debian these is mainly done by benevolent people in their spare time. This certainly is a nice gesture of them.
But can you really be sure that people that do this stuff as an hobby can deliver this in the quality that you expect and require? Lets be honest here, probably not. While it is a great thing that they donate their time it is very unlikely that they will always have time to update the packages they maintain in a timely manner. Furthermore, life goes on, people marry, get children or die. If there is no contingency plan for such plans then there is a really big problem just waiting to happen.
Right now, this is exactly what is happening. I have been pointing out this problem already 1.5 years ago and its finally time to recall that.
First of all: This is not intended as a flame. Its sole intent is to make people aware of the massive security problems existent in packaging choices such as done by Debian. Distribution packages are not always the best solution and can sometimes even expose you to critical vulnerabilities. Taking you and your data at risk.
Lets take a short glimpse at how Debian handles packaging. They have a policy stating that only security relevant changes should be backported and not the absolute version (emphasis mine):
Q: Why are you fiddling with an old version of that package?
The most important guideline when making a new package that fixes a security problem is to make as few changes as possible. Our users and developers are relying on the exact behaviour of a release once it is made, so any change we make can possibly break someones system.  This means that moving to a new upstream version is not a good solution, instead the relevant changes should be backported. 
What backporting basically means is the packager randomly decides that they take any version of a software and freeze the version to that. Only single security patches are backported.
Of course, you will miss out from many bug fixes but apparently in the eyes of some people stable software is defined by its ancient age. So much that for example this critical bug in ownCloud never received any backport, resulting in potential data loss.
So were now having multiple home-made problems here:
Just missing one security patch means taking user data at risk. And this is exactly what is happening. Lets just take a look at one example:
Yikes! Youre seeing it right! The phpMyAdmin version shipped by Debian is totally insecure on any stable release. So there are probably over 20.000 servers out there using an inherently insecure version of phpMyAdmin.
What is even more a shame: Debian has a tool to track open security vulnerabilities in software and nobody is giving a fuck. That should immediately point out to anybody that there is a gigantic problem and all alarm bells should ring.
And this problem is inherent. If phpMyAdmin sounds like a too obscure example, lets try Wordpress:
I have spent some minutes on other packages within the web category of the packaging system and Im still more than shocked. Since there are over 1.000 different packages in there I limited myself to some famous software plus the ones that I believed were interesting. And note that this is just the result of some minutes, now think about the time that a real adversary could spend on this
And thats where I stopped. Well, not quite true, the actual list is way longer but entering this into the Markdown format was just pain and I guess you understood the problem already. Just try it yourself, spend some minutes going through the Debian packages and you will pretty certainly find some that endanger your whole system.
Note again: This is web software, its often exposed to the general public and thus having the latest security updates is critical for your security. A single mistake here can take all your data at risk.
Distributions and application authors really need to come together and work on pushing easy solutions to collaborate. openSUSE Build Service is already a nice start for collaboration. But to be honest, probably for some applications packages are not the best solution. Did you know that for example Wordpress comes with automatic updates and updating ownCloud is just replacing single files on the server?
Rolling release distributions like OpenSuse Tumbleweed or Arch Linux are in my opinion really required to gain more traction to make the overall Linux ecosystem more secure. And before somebody brings it up: Containers will probably not save you either.