Re: UP process change
Posted: 25 Feb 2014 12:36
Code: Select all
sudo apt-get install myspell-pt-br
SolydXK Community Forums
Gee! I hate when I am caught in my ignorance I did check Synaptic for all those files... except myspell... (however I think I did... perhaps in another of my 10 machines with SolydXK ) I'm installing 2, right now.Schoelje wrote:
No, there will not be any KDE point releases.sumitb wrote:@Schoelje: Any official word from you on KDE point releases? How are we actually managing these in SolydK? Can I expect point releases outside of update packs?
Sorry for being so desperate
I really think users need to keep these things in perspective.sumitb wrote:...KDE point releases, like 4.11.x or 4.12.x, where only the x is changed, in my view should be part of the security updates that come in between of UPs. 3 months of time is major in such context and KDE team releases updates every month with critical security / other bug fixes. Not having these asap makes me shift in my seat a little...
Code: Select all
kurotsugi@kurozv3:~$ apt-cache policy kde-runtime kde-runtime: Installed: (none) Candidate: 4:4.12.1-90r0+b7 Version table: 4:4.12.1-90r0+b7 0 500 http://packages.solydxk.com/production/ solydxk/kdenext amd64 Packages 4:4.11.5-1 0 500 http://ftp.nl.debian.org/debian/ unstable/main amd64 Packages 4:4.11.3-1 0 500 http://ftp.nl.debian.org/debian/ testing/main amd64 Packages kurotsugi@kurozv3:~$
I'm afraid that I have to disagree with this one. IMO security patches should be applied immediately. the package maintainer should upgrade their package whenever a new security patch have been issued. nevertheless, we should remember that not every bug fixes is a security patch. it could also be a critical, high priority, or low priority bug fixes. in a DE it would be very rare to see a security patch. I've seen a lot kernel security patch or browser security patch but personally I never saw a DE security patch. that's why I said that DE isn't part of security update. on most occasion, minor version update usually only contain low priority patches. it's up the package maintainer to decide whether if he should upgrade his package or not.IMHO, it is highly unlikely that any SolydXK user will become a victim of a critical security breach! While it is true that software is continually being updated to close security holes, the packages currently installed by SolydXK are already extremely secure.
So, how many SolydXK users do you consider there are who have actually been a victim of any Linux security vulnerability? If there are any such users reading this thread then please advise - it would be interesting to count them up.kurotsugi wrote:I'm afraid that I have to disagree with this one. IMO security patches should be applied immediately. the package maintainer should upgrade their package whenever a new security patch have been issued...IMHO, it is highly unlikely that any SolydXK user will become a victim of a critical security breach! While it is true that software is continually being updated to close security holes, the packages currently installed by SolydXK are already extremely secure.
I hope you'll find your way in another distro.Juanmi wrote:Another Ubuntu-like distro... It is a shame.
What people forget is that not only does Ubuntu have a nine-month delay between updates, but there is also something called feature freeze that cuts off any new program versions from making their way into the release. For example, Wesnoth released version 1.10.7 about two months prior to Ubuntu 13.10, but it was not included in Ubuntu 13.10 due to feature freeze. Instead, Ubuntu opted to distribute a year-old version of Wesnoth, without any of the current bug-fixes. Meanwhile, SolydXK has Wesnoth 1.10.7 ready to roll.ane champenois wrote:I hope you'll find your way in another distro.Juanmi wrote:Another Ubuntu-like distro... It is a shame.
To further increase security both Firefox and Thunderbird are being built from source if there are new versions available.
I'm a lazy user and the reason I chose this OS is because I don't have to muck around fixing constant breakages.patzy wrote: If the 3 months system works out how about aiming for a two monthly cycle for 2015 and getting back to one every month for 2016. Note that this would be a goal and not set in stone.
Of course it would all depend on getting a lot of support both in time and donations from users, but I am sure that if the aim of getting back to monthly upgrades was made known then users would rally round to help where they can.
Code: Select all
apt install totem