From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id AB6FB138350 for ; Wed, 22 Apr 2020 18:38:49 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id BF75DE0AB8; Wed, 22 Apr 2020 18:38:43 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 60D50E09F8 for ; Wed, 22 Apr 2020 18:38:43 +0000 (UTC) Subject: Re: [OBORONA-SPAM] Re: [OBORONA-SPAM] Re: [OBORONA-SPAM] Re: [gentoo-user] Is Gentoo dead? To: gentoo-user@lists.gentoo.org References: <20200421190145.GF187193@redacted> <20200422161455.GA23147@legohost> <20200422162629.GA4639@legohost> <20200422180825.GA12885@legohost> <20200422182435.GI187193@redacted> From: Michael Orlitzky Message-ID: Date: Wed, 22 Apr 2020 14:38:40 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0 Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply MIME-Version: 1.0 In-Reply-To: <20200422182435.GI187193@redacted> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Archives-Salt: 705307ec-000f-44e5-9ef6-e9f3a6e68b45 X-Archives-Hash: 79dc626efb2c6aba1467de90a8bd0523 On 4/22/20 2:24 PM, Consus wrote: > On Wed, Apr 22, 2020 at 02:19:19PM -0400, Michael Orlitzky wrote: >> How do you plan to update all of your programs when there's a security >> vulnerability in, say, OpenSSL? > > emerge -1 @world of course :D > > By the way, Rust does support dynamic linking (to a degree), but does > not have (yet, I pray) stable ABI. So what's current Gentoo team > consensus on security updates? Will there be Cargo.lock metadata that > will allows portage to automatically rebuild against newer library > versions? > Rust packages get no security updates. Neither do Go packages. That's what I'm screaming about in those threads on gentoo-dev that you singled out in your original post =)