How to keep kernel up-to-date with Security/Errata Fixes?

Caballito de San Vicente Fly_Dragon_Fly at verizon.net
Mon Mar 27 05:24:48 PST 2006


On Mon, 27 Mar 2006 14:14:07 +0200
"Simon 'corecode' Schubert" <corecode at xxxxxxxxxxxx> wrote:

> On 26.03.2006, at 04:00, Dragronfly Kernel List User wrote:
>                           ^^^^^^^^^^^^^^^^^^^^^^^^^^^  you might want
> to insert $realname here, or at least spell "DragonFly" correctly...
> 
Sorry about that, fixed now (more or less).   :)

 ...

> 
> How can you state that patches are commited without thorough
> testing? First of all you don't know how much testing the developers
> actually do before committing the patch.  And secondly, patches which
> go to -release are security and bug fixes ONLY.  We don't add
> features to -release like freebsd does on -stable.  You really need
> to read documentation before making such claims.

I was making no claim, I was simply making an observation based on my
perception of the fast speed that some patches are committed.  You are
right though, I should read the documentation more thoroughly and will
do so.

Not sure why the tenor of your reply is so angry and defensive.  I
asked questions to further my knowledge and not to criticize Dragonfly
or its developers.

> ... 
> 
> > If this is in fact the way DF RELEASE releases come out, I fail to
> > see why a 1.6.2 would be "safer" than the official 1.6.0 (or for
> > that matter
> > 1.4.3 vs. 1.40).
> 
> It is not, in fact.
> 
> > I'm simply trying to plan for the best release to install on the
> > production server.
> 
> Always the latest release.
> 
> ...

Here I'm confused again.  Do you mean the latest full release (1.4.0)
or the latest tag (1.4.3)?

Thank you.






More information about the Kernel mailing list