1 |
On Fri, 28 Jul 2006, Dan Noe wrote: |
2 |
|
3 |
> If that isn't acceptable to you, you should seriously consider using a |
4 |
> commercial distribution where people *are* paid to fix security bugs. |
5 |
|
6 |
I second that opinion. Personally, I'm quite grateful for all of the hard |
7 |
work all of the Gentoo developers put in, and would like to take this |
8 |
opportunity to point that out explicitly. |
9 |
|
10 |
This vulnerability was only announced yesterday, and given that are |
11 |
probably no visible changes between 1.5.0.4 and 1.5.0.5 other than internal |
12 |
bug fixes, a temporary workaround would probably be as simple as copying |
13 |
the ebuild to your local overlay directory and changing the version number. |
14 |
|
15 |
Having spent the last month trying to put together a reasonably |
16 |
minimalistic install of Red Hat Enterprise Linux for an Oracle project, let |
17 |
me tell you that while they might fix bugs quickly, working with it is a |
18 |
pain in the ass, particularly compared to the simplicity and flexibility |
19 |
that is Gentoo. (you have to love wanting to install package A, which has a |
20 |
dependency on package B you don't even care about, but can't get rid of, |
21 |
and that dependency cascades into a dozen more packages you want nothing to |
22 |
do with that have to install just to get package A <sigh>...) |
23 |
|
24 |
|
25 |
-- |
26 |
Paul B. Henson | (909) 979-6361 | http://www.csupomona.edu/~henson/ |
27 |
Operating Systems and Network Analyst | henson@×××××××××.edu |
28 |
California State Polytechnic University | Pomona CA 91768 |
29 |
-- |
30 |
gentoo-security@g.o mailing list |