Re: Security release criterion proposal

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 5/18/11 4:49 PM, Kevin Kofler wrote:
> The thing is, if we block the release for each and every known security
> issue, considering the time passing between notification and public
> availability of a fix, we will never be able to release anything. We have to
> draw the line somewhere, and the best way to do it is to use our time-based
> schedule.

False induction.

>> I'd rather not ship something that I _know_ will result in the user
>> getting rooted.  This is so fundamental a tenet of quality that I have
>> difficulty even believing someone could disagree.  I guess Kevin's brain
>> is simply something I should stop being surprised by.
>
> You don't KNOW that it will get the user rooted. Now if the hole is in a
> service listening to the Internet by default and is getting exploited by an
> automated worm, you can reasonably say that it WILL get the user rooted, but
> if it's e.g. a browser vulnerability, it will only hit the users if and when
> they access an infected or malicious site. Hopefully they'll have installed
> our 0-day security fix by then! (I'd hope sites like start.fedoraproject.org
> will not carry some trojan horse!)

Now you're drawing lines.  Before you were saying "this is impossible, 
we shouldn't try".  Moving the goalposts.

I'm done arguing with you on this, it's clear you don't know how.

- ajax
-- 
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux