Hacker News new | past | comments | ask | show | jobs | submit login

> Well, as one of those upstream authors whose code was patched: I was never contacted about it, so I never knew there was a requirement to be met, and so they carried around a bad patch for years, about which I knew nothing. Once a user pointed this out to me, the next release fixed the underlying issue in a better way. After years in which the Debian folks didn't file an issue or report the problem in any way that I could tell.

the maintainer made an error there. did you open a bugreport that you fixed it so the patch is not necessary?

> And to be fair, I think this rather depends a lot on the downstream package maintainer; I've witnessed this with other projects where they were quite good in interacting with upstream to get something sorted out. I am not really sure if any policy Debian/Fedora/... could enact would really help with it; people can (accidentally or intentionally) ignore them.

yeah and that's the point. people in this thread (not you as far as i see) say they do not trust debian because of this, but other distributors and packagers? do they have technical or organisatorial fences for avoiding such mishaps? if not, then other distributions are as problematic as debian, even arch.

debian did a whole lotta good for Free software and i really start to dislike how people shit on the project (again not you).




> other distributors and packagers? do they have technical or organisatorial fences for avoiding such mishaps?

Many distributions have a dedicated security team that has to sign off any patches to security-critical software. Debian's position is that they do not have the resources for such a team, which is fair enough, but IMO the conclusion should be that they don't have the resources to be applying their own patches to security-critical software.

More subjectively I get the sense that Debian packagers patch more aggressively and generally think the Debian way of things is better. This isn't completely groundless: there's a lot of very high quality engineering in Debian, and for a long time their package management was head and shoulders above others, especially if we're talking about C programs/libraries where upstream dependency management is very weak. But it's also made for a culture where packagers think they know better than upstream maintainers, and an approach that ends up conflicting quite a bit with newer languages where there is high-quality dependency management in the upstream builds.


> Many distributions have a dedicated security team that has to sign off any patches to security-critical software

This is false. Debian has a security team and it's way more active than most distributions.

> But it's also made for a culture where packagers think they know better than upstream maintainers

Yes and for good reasons.


> Many distributions have a dedicated security team

Which are some of those distros? (I'd consider using myself in the future)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: